You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/hdfs/pages/usage-guide/security.adoc
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
== Authentication
4
4
Currently the only supported authentication mechanism is Kerberos, which is disabled by default.
5
5
For Kerberos to work a Kerberos KDC is needed, which the users needs to provide.
6
-
The xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation] states which kind of Kerberos servers are supported and how they can be configured.
6
+
The xref:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation] states which kind of Kerberos servers are supported and how they can be configured.
7
7
8
8
IMPORTANT: Kerberos is supported starting from HDFS version 3.3.x
9
9
@@ -12,7 +12,7 @@ To configure HDFS to use Kerberos you first need to collect information about yo
12
12
Additionally you need a service-user, which the secret-operator uses to create create principals for the HDFS services.
13
13
14
14
=== 2. Create Kerberos SecretClass
15
-
Afterwards you need to enter all the needed information into a SecretClass, as described in xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation].
15
+
Afterwards you need to enter all the needed information into a SecretClass, as described in xref:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation].
16
16
The following guide assumes you have named your SecretClass `kerberos-hdfs`.
17
17
18
18
=== 3. Configure HDFS to use SecretClass
@@ -55,7 +55,7 @@ We have an https://github.com/stackabletech/hdfs-operator/blob/main/tests/templa
55
55
56
56
== Authorization
57
57
For authorization we developed https://github.com/stackabletech/hdfs-utils[hdfs-utils], which contains an OPA authorizer and group mapper.
58
-
This matches our general xref:home:concepts:opa.adoc[] mechanisms.
58
+
This matches our general xref:concepts:opa.adoc[] mechanisms.
59
59
60
60
IMPORTANT: It is recommended to enable Kerberos when doing Authorization, as otherwise you don't have any security measures at all.
61
61
There still might be cases where you want authorization on top of a cluster without authentication, as you don't want to accidentally drop files and therefore use different users for different use-cases.
0 commit comments