Interconnecting Hive with External LDAP
This section applies to MRS 3.1.0 or later.
- Log in to FusionInsight Manager.
- On FusionInsight Manager, choose Cluster > Name of the desired cluster > Services > Hive. On the page that is displayed, click the Configurations tab then the All Configurations sub-tab. On this sub-tab page, click HiveServer(Role) and select Security.
- Set the following parameters.
Table 1 Parameter configuration Parameter
Description
Remarks
hive.server2.authentication
HiveServer authentication mode
Value: KERBEROS or LDAP
Default value: KERBEROS
hive.server2.authentication.ldap.baseDN
LDAP base DN
-
hive.server2.authentication.ldap.password
LDAP password
LDAP password used for health check
hive.server2.authentication.ldap.url.ip
LDAP IP address
-
hive.server2.authentication.ldap.url.port
LDAP port number
Default value: 389
hive.server2.authentication.ldap.userDNPattern
LDAP user DN pattern
Separate multiple values with colons (:), for example, cn=%s,ou=People1,dc=huawei,dc=com: cn=%s,ou=People2,dc=huawei,dc=com.
hive.server2.authentication.ldap.username
LDAP username
LDAP username used for health check
- After the modification, click Save in the upper left corner. In the displayed dialog box, click OK.
- Choose Cluster > Name of the desired cluster > Services > Hive > Instance. On the displayed page, select the instances whose Configuration Status is Expired, choose More > Restart Instance, and restart the instance.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot