Method for establishing hadoop identity authentication mechanism

A hadoop cluster and identity authentication technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as cluster node impersonation, hadoop access control insecurity, etc., achieve efficient operation and ensure reliable security.

Inactive Publication Date: 2015-02-18
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a Hadoop identity authentication mechanism construction method, which is used to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing hadoop identity authentication mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0013] Take the following existing environment as an example: an available system package yum source (both local and network); an available three-node hadoop cluster environment, and the host names of the three nodes are: node01.test .com, node02.test.com, node03.test.com.

[0014] Such as figure 1 As shown, the specific steps are described below.

[0015] In step S1, the installation package required by the kerberos service is installed, and related configuration files are modified to build a key distribution center (KDC) server. Specifically, all nodes install krb5-workstation, krb5-workstation and their dependent packages, and KDC nodes also install krb5-server.

[0016] In step S2, a new principal database is created for use by the hadoop cluster. Wherein, principal represents a basic entity (for example, a client or a server)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for establishing a hadoop identity authentication mechanism. The method comprises the following steps that a KDC server is established; a hafs principal, a mapred principal and an HTTP principal are established for each node in a hadoop cluster; a hafs.keytab file including the hdfs principals and the HTTP principals is established; a mapred.keytab file including the mapred principals and the HTTP principals is established. According to the method for establishing the hadoop identity authentication mechanism, the problems that in the prior art, hadoop access control is not safe, and cluster nodes can be simulated are solved.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to a method for constructing an identity authentication mechanism of hadoop. Background technique [0002] The era of big data provides many opportunities for Hadoop. Hadoop has been valued for its good scalability in massive data, efficient reading and writing and processing capabilities. However, behind many opportunities, Hadoop also faces many challenges. How to ensure the security of Hadoop has naturally become an unavoidable topic. Without access control, the data stored in it can be accessed at will or even perform misoperations such as deletion and modification, which will cause many potential risks. Therefore, Hadoop access control has become a very important requirement. [0003] In a Hadoop environment without authentication, authentication is not required when users interact with Hadoop Distributed File System (HDFS) or M / R. Malicious users can pretend to be rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 宗栋瑞郭美思宋立伟
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products