Details
-
New Feature
-
Status: Open
-
Minor
-
Resolution: Unresolved
-
None
-
None
-
None
-
HDP 2.6 + Kerberos + AD LDAP multi-domain forest
Description
Feature Request to add principal mapping rules similar to Hadoop's auth_to_local.
This will allow munging pincipals and rule based remappings to differentiate duplicate users in multi-domain Active Directory forests where the LDAP results returned from the global catalog include duplicate usernames which need to be translated with a prefix/suffix in order to differentiate between domains to prevent users from different domains sharing logins, permissions etc.
Attachments
Issue Links
- depends upon
-
SHIRO-465 Support externalized principal mapping in AuthenticatingRealm and ModularRealmAuthenticator
- Open
- is depended upon by
-
ZEPPELIN-2794 User/group mapping rules similar to Hadoop's auth_to_local
- Open
- relates to
-
SHIRO-465 Support externalized principal mapping in AuthenticatingRealm and ModularRealmAuthenticator
- Open