Perform the following steps to specify the
credentials for your Kerberos security.
- Select Kerberos as your security type.
- Click Next to select your Kerberos security method.
-
Choose one of the following security methods and specify the Kerberos
credentials you obtained from your cluster administrator:
- Password: Specify the Authentication username and Password options.
If you are connected to the Pentaho Repository and are using secure impersonation, specify the additional Impersonation username and Password options. See Try Pentaho Data Integration and Analytics if your environment requires advanced settings, your server is on Windows, or you are using a Cloudera Impala database for secure impersonation.
- Keytab: Specify the Authentication username and Authentication Keytab options. Click Browse to navigate to your keytab file.
If you are connected to the Pentaho Repository and are using secure impersonation, specify the additional Impersonation username and Impersonation Keytab options. See Try Pentaho Data Integration and Analytics if your environment requires advanced settings, your server is on Windows, or you are using a Cloudera Impala database for secure impersonation.
- Password: Specify the Authentication username and Password options.
- Click Next to test your connection. See Configure and test connection for more information.
After you specify your security credentials, PDI tests the
connection to your Hadoop cluster. If no errors occur during the connection, PDI is successfully
connected to your Hadoop cluster.
Note: You can define different principal users for each of your named connections only if
all the clusters for these connections are in the same Kerberos realm. See MIT Kerberos Documentation for more
information about Kerberos realms.
If you have problems, see troubleshooting sections of the Administer Pentaho Data Integration and Analytics document to resolve the errors, then test your connection again.