You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
:::image type="content" source="media/register-scan-hdfs/register-sources.png" alt-text="Screenshot of HDFS source registration in Purview." border="true":::
67
67
68
68
## Scan
69
69
70
70
Follow the steps below to scan HDFS to automatically identify assets. For more information about scanning in general, see our [introduction to scans and ingestion](concept-scans-and-ingestion.md).
71
71
72
72
### Authentication for a scan
73
73
74
-
The supported authentication type for a HDFS source is **Kerberos authentication**.
74
+
The supported authentication type for an HDFS source is **Kerberos authentication**.
75
75
76
76
### Create and run scan
77
77
@@ -96,7 +96,7 @@ To create and run a new scan, follow these steps:
96
96
* Provide the user name in the format of `<username>@<domain>.com` in the User name input field. Learn more from [Use Kerberos authentication for the HDFS connector](#use-kerberos-authentication-for-the-hdfs-connector).
97
97
* Store the user password used to connect to HDFS in the secret key.
98
98
99
-
:::image type="content" source="media/register-scan-hdfs/scan.png" alt-text="set up HDFS scan" border="true":::
99
+
:::image type="content" source="media/register-scan-hdfs/scan.png" alt-text="Screenshot of HDFS scan configurations in Purview." border="true":::
3. Select the encryption algorithm that's used in Kerberos.
272
272
273
-
a. Select **Server Manager**>**Group Policy Management**>**Domain**>**Group Policy Objects**>**Default or Active Domain Policy**, and thenselect**Edit**.
273
+
1. Select **Server Manager**>**Group Policy Management**>**Domain**>**Group Policy Objects**>**Default or Active Domain Policy**, and thenselect**Edit**.
274
274
275
-
b. On the **Group Policy Management Editor** pane, select**Computer Configuration**>**Policies**>**Windows Settings**>**Security Settings**>**Local Policies**>**Security Options**, and then configure **Network security: Configure Encryption types allowed for Kerberos**.
275
+
1. On the **Group Policy Management Editor** pane, select**Computer Configuration**>**Policies**>**Windows Settings**>**Security Settings**>**Local Policies**>**Security Options**, and then configure **Network security: Configure Encryption types allowed for Kerberos**.
276
276
277
-
c. Select the encryption algorithm you want to use when you connect to the KDC server. You can selectall the options.
277
+
1. Select the encryption algorithm you want to use when you connect to the KDC server. You can selectall the options.
278
278
279
-
:::image type="content" source="media/register-scan-hdfs/config-encryption-types-for-kerberos.png" alt-text="Screenshot of the "Network security: Configure encryption types allowed for Kerberos" pane":::
279
+
:::image type="content" source="media/register-scan-hdfs/config-encryption-types-for-kerberos.png" alt-text="Screenshot of the Network security: Configure encryption types allowed for Kerberos pane.":::
280
280
281
-
d. Use the `Ksetup`command to specify the encryption algorithm to be used on the specified realm.
281
+
1. Use the `Ksetup`command to specify the encryption algorithm to be used on the specified realm.
4. Create the mapping between the domain account and the Kerberos principal, so that you can use the Kerberos principal in the Windows domain.
288
288
289
-
a. Select **Administrative tools**>**Active Directory Users and Computers**.
289
+
1. Select **Administrative tools**>**Active Directory Users and Computers**.
290
290
291
-
b. Configure advanced features by selecting **View**>**Advanced Features**.
291
+
1. Configure advanced features by selecting **View**>**Advanced Features**.
292
292
293
-
c. On the **Advanced Features** pane, right-click the account to which you want to create mappings and, on the **Name Mappings** pane, selectthe**Kerberos Names** tab.
293
+
1. On the **Advanced Features** pane, right-click the account to which you want to create mappings and, on the **Name Mappings** pane, selectthe**Kerberos Names** tab.
294
294
295
-
d. Add a principal from the realm.
295
+
1. Add a principal from the realm.
296
296
297
-
:::image type="content" source="media/register-scan-hdfs/map-security-identity.png" alt-text="Screenshot of the "Security Identity Mapping" pane":::
297
+
:::image type="content" source="media/register-scan-hdfs/map-security-identity.png" alt-text="Screenshot of the Security Identity Mapping pane.":::
298
298
299
299
**On the self-hosted integration runtime machine:**
0 commit comments