[
https://issues.apache.org/jira/browse/HIVE-4707?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13685031#comment-13685031
]
Prasad Mujumdar commented on HIVE-4707:
---------------------------------------
[~ashutoshc] Thanks for the feedback.
yes, the mangled name (eg foo@bar) works as far as the authentication is
concerned. In that case, HiveServer sees the user name as foo@bar instead of
foo. That makes supporting things like bridging LDAP authentication with
kerberos impersonation hard. This is a pretty common usecase to have
hiveserver2 as a gateway to connect secure hadoop using a non-kerberos
authentication mechanism. Due to this username format, you can't make it work
with Active Directory.
Besides it a minor usability issue ...
> Support configurable domain name for HiveServer2 LDAP authentication using
> Active Directory
> -------------------------------------------------------------------------------------------
>
> Key: HIVE-4707
> URL: https://issues.apache.org/jira/browse/HIVE-4707
> Project: Hive
> Issue Type: Bug
> Components: HiveServer2
> Affects Versions: 0.11.0
> Reporter: Prasad Mujumdar
> Assignee: Prasad Mujumdar
> Fix For: 0.12.0
>
> Attachments: HIVE-4707-1.patch
>
>
> LDAP providers like Active Directory use a fully qualified user name in
> user@domain format. For HiveServer2 LDAP auth can be used with active
> directory by passing the userid in that format. This causes hive
> authentication module to retrun the username in that mangled format. This
> prohibits LDAP users to be impersonated over secure hadoop or reported
> correctly in audit etc.
> HiveServer2 should support a configurable LDAP domain that is appended to the
> user name.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira