Details
-
Bug
-
Status: Resolved
-
Critical
-
Resolution: Fixed
-
2.7.2
-
kerberos
-
Reviewed
Description
In the scenario of a trust between two directories, eg. FreeIPA (ipa.local) and Active Directory (ad.local) users can be made available on the OS level by something like sssd. The trusted users will be of the form 'user@ad.local' while other users are will not contain the domain. Executing 'id -Gn user@ad.local' will successfully return the groups the user belongs to if configured correctly.
However, it is assumed by Hadoop that users of the format with '@' cannot be correct. This code is in KerberosName.java and seems to be a validator if the 'auth_to_local' rules are applied correctly.
In my opinion this should be removed or changed to a different kind of check or maybe logged as a warning while still proceeding, as the current behavior limits integration possibilities with other standard tools.
Workaround are difficult to apply (by having a rewrite by system tools to for example user_ad_local) due to down stream consequences.
Attachments
Attachments
Issue Links
- is depended upon by
-
HADOOP-12649 Improve Kerberos diagnostics and failure handling
- Open
- is related to
-
HIVE-15174 Respect auth_to_local rules from hdfs configs (core-site.xml) for LDAP authentication too
- Open
-
HIVE-12981 ThriftCLIService uses incompatible getShortName() implementation
- Closed
-
HADOOP-15996 Plugin interface to support more complex usernames in Hadoop
- Resolved
-
HADOOP-15959 revert HADOOP-12751
- Resolved