Updated on 2022-08-16 GMT+08:00

Preparing for Security Authentication

Scenario

Before accessing services in the secure cluster environment, you must be authorized by Kerberos. Codes for security authentication need to be written into the Kudu applications to ensure that the applications can work properly.

Two security authentication methods are described as follows:

  • Authentication by running command lines:

    Before running the Kudu applications, run the following command on the Kudu client to obtain authentication:

    kinit component service user

This method applies only to the Linux OS that is installed with the Kudu client.

  • Code authentication:

    Obtain the principal and keytab files of the client for authentication.