This section describes how to configure Search in CDH 5 to enable authentication.
When authentication is enabled, only specified hosts and users can connect to Search. Authentication also verifies that clients connect to legitimate servers. This feature prevents spoofing such as impersonation and man-in-the-middle attacks. Search supports Kerberos and LDAP authentication.
- Enabling Kerberos Authentication for Search
- Enabling LDAP Authentication for Search
- Using Kerberos with Search
|Solr Authentication||Use Case|
|No authentication||Insecure cluster|
|Kerberos only||The Hadoop cluster has kerberos turned on and every user (or client) connecting to Solr has a Kerberos principal.|
|Kerberos and LDAP||The Hadoop cluster has kerberos turned on. External Solr users (or clients) don’t have Kerberos principal but do have an identity in the LDAP server.|
Once you are finished setting up authentication, configure Sentry authorization. Authorization involves specifying which resources can be accessed by particular users when they connect through Search. See Enabling Sentry Authorization for Search using the Command Line for details.
|<< Configuring Oozie HA with Kerberos||Enabling Kerberos Authentication for Search >>|