Kerberos
To use the Kerberos authenticator, add an authenticator with type kerberos
to the authenticatorChain. The example above uses the name “MyKerberosAuthenticator” for the Authenticator.
Configuration of the named authenticator is assigned through properties with the form:
The configuration examples in the rest of this document will use “kerberos” as the name of the authenticator being configured.
As a note, it is required that the SPNego principal in use by the druid processes must start with HTTP (This specified by ) and must be of the form “HTTP/_HOST@REALM”. The special string _HOST will be replaced automatically with the value of config druid.host
druid.auth.authenticator.kerberos.authToLocal
allows you to set a general rules for mapping principal names to local user names. The syntax for mapping rules is RULE:\[n:string](regexp)s/pattern/replacement/g
. The integer n indicates how many components the target principal should have. If this matches, then a string will be formed from string, substituting the realm of the principal for $0 and the nth component of the principal for $n. e.g. if the principal was druid/admin then \[2:$2$1suffix]
would result in the string admindruidsuffix
. If this string matches regexp, then the s//[g] substitution command will be run over the string. The optional g will cause the substitution to be global over the string, instead of replacing only the first match in the string. If required, multiple rules can be joined by newline character and specified as a String.
In Active Directory environment, SPNEGO token in the Authorization header includes PAC (Privilege Access Certificate) information, which includes all security groups for the user. In some cases when the user belongs to many security groups the header to grow beyond what druid can handle by default. In such cases, max request header size that druid can handle can be increased by setting druid.server.http.maxRequestHeaderSize
(default 8KiB) and druid.router.http.maxRequestBufferSize
(default 8KiB).
Druid internal processes communicate with each other using an escalated http Client. A Kerberos enabled escalated HTTP Client can be configured by following properties -
Property | Example Values | Description | Default | required |
---|---|---|---|---|
druid.escalator.type | kerberos | Type of Escalator client used for internal process communication. | n/a | Yes |
druid.escalator.internalClientPrincipal | druid@EXAMPLE.COM | Principal user name, used for internal process communication | n/a | Yes |
/etc/security/keytabs/druid.keytab | Path to keytab file used for internal process communication | n/a | Yes | |
druid.escalator.authorizerName | MyBasicAuthorizer | Authorizer that requests should be directed to. | n/a | Yes |
To access druid HTTP endpoints via curl user will need to first login using
kinit
command as follows -Now you can access druid HTTP endpoints using curl command as follows -
e.g to send a query from file
query.json
to the Druid Broker use this command -Note: Above command will authenticate the user first time using SPNego negotiate mechanism and store the authentication cookie in file. For subsequent requests the cookie will be used for authentication.
To access Coordinator/Overlord console from browser you will need to configure your browser for SPNego authentication as follows -
- Safari - No configurations required.
- Firefox - Open firefox and follow these steps -
- Double-click and add the following values:
"http://druid-coordinator-hostname:ui-port"
and"http://druid-overlord-hostname:port"
- Double-click and add the following values:
- Google Chrome - From the command line run following commands -
google-chrome --auth-server-whitelist="druid-coordinator-hostname" --auth-negotiate-delegate-whitelist="druid-coordinator-hostname"
google-chrome --auth-server-whitelist="druid-overlord-hostname" --auth-negotiate-delegate-whitelist="druid-overlord-hostname"
- Internet Explorer -
- Configure trusted websites to include and
"druid-overlord-hostname"
- Allow negotiation for the UI website.
- Configure trusted websites to include and