Kerberos must be installed and configured before you can use this authentication mechanism. For information about configuring and operating Kerberos on Windows, see Configuring Kerberos Authentication for Windows. For other operating systems, see the MIT Kerberos documentation: http://web.mit.edu/kerberos/krb5-latest/doc/.
You provide this information to the driver in the connection URL. For more information about the syntax of the connection URL,
Note:
transportMode
property is not set, the driver defaults SASL. If the hive.server2.transport.mode property has been set to HTTP on the server side, set the transportMode
property to http
. To configure default Kerberos authentication:
AuthMech
property to 1
.KrbRealm
property.If your Kerberos setup does not define a default realm or if the realm of your Hive server is not the default, then set the KrbRealm
property to the realm of the Hive server.
KrbHostFQDN
property to the fully qualified domain name of the Hive server host.KrbAuthType
property as follows:KrbAuthType
property to 0
. Alternatively, do not set the KrbAuthType
property.KrbAuthType
property to 1
.KrbAuthType
property to 2
.For more detailed information about how the driver obtains Kerberos Subjects based on these settings, see KrbAuthType.
For example, the following connection URL connects to a Hive server with Kerberos enabled, but without SSL enabled:
jdbc:hive
KrbRealm=EXAMPLE.COM;KrbHostFQDN=
KrbServiceName=hive
In this example, Kerberos is enabled for JDBC connections, the Kerberos service principal name is hive/node1.example.com@EXAMPLE.COM, the host name for the data source is node1.example.com, and the server is listening on port