Uploaded image for project: 'Ambari'
  1. Ambari
  2. AMBARI-10094

Kerberos: disable edit on generated ambari principal and keytab configs

Attach filesAttach ScreenshotVotersWatch issueWatchersCreate sub-taskLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Critical
    • Resolution: Fixed
    • 2.0.0
    • 2.1.0
    • ambari-web
    • None

    Description

      After enabling kerberos, if you browse to Service > Configs, you are see properties for Ambari Principals *_principal_name. For example, smokeuser_principal_name can be seen in all services, and hbase_principal_name can be see in HBase.
      Attached screen shot shows the properties showing thru the Service > Hbase > Configs tab.
      There properties should not be editable by the user in the UI. These values are generated by the kerb infra based on the descriptor pattern, and a user editing these can cause issues.

      Attachments

        Activity

          This comment will be Viewable by All Users Viewable by All Users
          Cancel

          People

            atkach Andrii Tkach
            atkach Andrii Tkach
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Slack

                Issue deployment