Kerberos must be installed and configured before you can use this authentication mechanism. For information about configuring and operating Kerberos on Windows, see Configuring Kerberos Authentication for Windows. For other operating systems, see the MIT Kerberos documentation: http://web.mit.edu/kerberos/krb5-latest/doc/.
You provide this information to the driver in the connection URL. For more information about the syntax of the connection URL,
transportModeproperty is not set, the driver defaults SASL. If the hive.server2.transport.mode property has been set to HTTP on the server side, set the
To configure default Kerberos authentication:
If your Kerberos setup does not define a default realm or if the realm of your Hive server is not the default, then set the
KrbRealm property to the realm of the Hive server.
KrbHostFQDNproperty to the fully qualified domain name of the Hive server host.
KrbAuthTypeproperty as follows:
0. Alternatively, do not set the
For more detailed information about how the driver obtains Kerberos Subjects based on these settings, see KrbAuthType.
For example, the following connection URL connects to a Hive server with Kerberos enabled, but without SSL enabled:
In this example, Kerberos is enabled for JDBC connections, the Kerberos service principal name is hive/node1.example.com@EXAMPLE.COM, the host name for the data source is node1.example.com, and the server is listening on port