You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,34 +15,34 @@ Enterprise Security Package (ESP) clusters provide multi-user access on Azure HD
15
15
16
16
In this article, you learn how to configure a HDInsight cluster with ESP by using Azure Active Directory Domain Services (Azure AD-DS).
17
17
18
+
>[!NOTE]
19
+
>ESP is available in HDI 3.6+ for Spark, Interactive, and Hadoop. ESP for HBase cluster types is in preview.
20
+
21
+
18
22
## Enable Azure AD-DS
19
23
20
24
Enabling Azure AD-DS is a prerequisite before you can create a HDInsight cluster with ESP. For more information, see [Enable Azure Active Directory Domain Services using the Azure portal](../../active-directory-domain-services/active-directory-ds-getting-started.md).
21
25
22
26
> [!NOTE]
23
27
> Only tenant administrators have the privileges to create an Azure AD-DS instance. If you use Azure Data Lake Storage Gen1 as the default storage for HDInsight, make sure that the default Azure AD tenant for Data Lake Storage Gen1 is same as the domain for the HDInsight cluster. Because Hadoop relies on Kerberos and basic authentication, multi-factor authentication needs to be disabled for users who will access the cluster.
24
28
25
-
After you provision the Azure AD-DS instance, create a service account in Azure Active Directory (Azure AD) with the right permissions. If this service account already exists, reset its password and wait until it syncs to Azure AD-DS. This reset will result in the creation of the Kerberos password hash, and it might take up to 30 minutes to sync to Azure AD-DS.
29
+
Secure LDAP is for an Azure AD-DS managed domain. When enabling LDAPS, put the domain name in the subject name or the alternative subject name in the certificate. For more information, see [Configure secure LDAP for an Azure AD-DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md).
26
30
27
-
The service account needs the following privileges:
31
+
## Add managed identity
28
32
29
-
- Join machines to the domain and place machine principals within the OU that you specify during cluster creation.
30
-
- Create service principals within the OU that you specify during cluster creation.
31
-
32
-
> [!NOTE]
33
-
> Because Apache Zeppelin uses the domain name to authenticate the administrative service account, the service account *must* have the same domain name as its UPN suffix for Apache Zeppelin to function properly.
33
+
After you enabled Azure AD-DS, create a managed identity and assign it to the **HDInsight Domain Services Contributor** role in Azure AD-DS Access control.
34
34
35
-
To learn more about OUs and how to manage them, see [Create an OU on an Azure AD-DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-create-ou.md).
35
+

36
36
37
-
Secure LDAP is for an Azure AD-DS managed domain. For more information, see [Configure secure LDAP for an Azure AD-DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md).
37
+
For more information, see [What is managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md).
38
38
39
39
## Create a HDInsight cluster with ESP
40
40
41
-
The next step is to create the HDInsight cluster with ESP enabled using Azure AD-DS and the service account that you created in the previous section.
41
+
The next step is to create the HDInsight cluster with ESP enabled using Azure AD-DS.
42
42
43
43
It's easier to place both the Azure AD-DS instance and the HDInsight cluster in the same Azure virtual network. If you choose to put them in different virtual networks, you must peer those virtual networks so that HDInsight VMs have a line of sight to the domain controller for joining the VMs. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md).
44
44
45
-
When you create an HDInsight cluster, you have the option to enable Enterprise Security Package to connect your cluster with Azure AD-DS. ESP is only available in HDI 3.6+ for Spark, Interactive, Hadoop, and HBase cluster types.
45
+
When you create an HDInsight cluster, you have the option to enable Enterprise Security Package to connect your cluster with Azure AD-DS.
46
46
47
47

48
48
@@ -56,9 +56,9 @@ Early detection saves time by allowing you to fix errors before creating the clu
56
56
57
57
When you create a HDInsight cluster with ESP, you must supply the following parameters:
58
58
59
-
-**Cluster admin user**: Choose an admin for your cluster from your list of Active Directory users.
59
+
-**Cluster admin user**: Choose an admin for your cluster from your synced Azure AD-DS.
60
60
61
-
-**Cluster access groups**: The security groups whose users you want to sync to the cluster. For example, HiveUsers. If you want to specify multiple user groups, separate them by semicolon ‘;’. The group(s) must exist in the directory prior to provisioning. For more information, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md). If the group does not exist, an error occurs: "Group HiveUsers not found in the Active Directory."
61
+
-**Cluster access groups**: The security groups whose users you want to sync to the cluster should be synced and available in Azure AD-DS. For example, HiveUsers. If you want to specify multiple user groups, separate them by semicolon ‘;’. The group(s) must exist in the directory prior to provisioning. For more information, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md). If the group does not exist, an error occurs: "Group HiveUsers not found in the Active Directory."
62
62
63
63
-**LDAPS URL**: An example is ldaps://contoso.onmicrosoft.com:636.
Copy file name to clipboardExpand all lines: articles/hdinsight/domain-joined/apache-domain-joined-run-kafka.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.date: 09/24/2018
12
12
13
13
# Tutorial: Configure Kafka policies in HDInsight with Enterprise Security Package
14
14
15
-
Learn how to configure Apache Ranger policies for Enterprise Security Package (ESP) Kafka clusters, which are connected to a domain allowing users to authenticate with domain credentials. In this tutorial, you create two Ranger policies to restrict access to `sales*` and `marketingspend` topics.
15
+
Learn how to configure Apache Ranger policies for Enterprise Security Package (ESP) Kafka clusters. ESP clusters are connected to a domain allowing users to authenticate with domain credentials. In this tutorial, you create two Ranger policies to restrict access to `sales*` and `marketingspend` topics.
16
16
17
17
In this tutorial, you learn how to:
18
18
@@ -158,9 +158,9 @@ Based on the Ranger policies configured, **sales_user** can produce/consume topi
@@ -200,5 +202,5 @@ Based on the Ranger policies configured, **sales_user** can produce/consume topi
200
202
201
203
## Next steps
202
204
203
-
*[Bring your own key to Kafaka](https://docs.microsoft.com/azure/hdinsight/kafka/apache-kafka-byok)
205
+
*[Bring your own key to Kafka](https://docs.microsoft.com/azure/hdinsight/kafka/apache-kafka-byok)
204
206
*[An introduction to Hadoop security with Enterprise Security Package](https://docs.microsoft.com/azure/hdinsight/domain-joined/apache-domain-joined-introduction)
0 commit comments