Details
-
Improvement
-
Status: Closed
-
Major
-
Resolution: Fixed
-
3.4.3, 3.4.4, 3.5.0
-
Allow system property "zookeeper.clusterName", if defined, to be used as the instance portion of zookeeper server's Kerberos principal name. Otherwise, server's hostname will be used.
Description
Server principal on client side is derived using hostname.
org.apache.zookeeper.ClientCnxn.SendThread.startConnect()
try { zooKeeperSaslClient = new ZooKeeperSaslClient("zookeeper/"+addr.getHostName()); }
This may have problems when admin wanted some customized principals like zookeeper/clusterid@HADOOP.COM where clusterid is the cluster identifier but not the host name.
IMO, server principal also should be configurable as hadoop is doing.
Attachments
Attachments
Issue Links
- blocks
-
HBASE-1697 Discretionary access control
- Closed
- is related to
-
ZOOKEEPER-2139 Support multiple ZooKeeper client, with different configurations, in a single JVM
- Closed
-
HBASE-4791 Allow Secure Zookeeper JAAS configuration to be programmatically set (rather than only by reading JAAS configuration file)
- Closed
-
ZOOKEEPER-2433 ZooKeeperSaslServer: allow user principals in subject
- Closed
- relates to
-
ZOOKEEPER-1373 Hardcoded SASL login context name clashes with Hadoop security configuration override
- Resolved
-
ZOOKEEPER-1420 Kerberos principal to user mapping / authorization
- Open
- requires
-
ZOOKEEPER-2257 Make zookeeper server principal configurable at zookeeper client side
- Resolved
- links to