Skip to content

Commit 976cae3

Browse files
authored
Updated How do I create a keytab for an HDInsight ESP cluster
Updated How do I create a keytab for an HDInsight ESP cluster Ref PR https://github.com/Azure/azure-docs/pull/3 Ref-nicjohn79
1 parent c604471 commit 976cae3

File tree

1 file changed

+29
-2
lines changed

1 file changed

+29
-2
lines changed

articles/hdinsight/hdinsight-faq.yml

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: hdinsight
99
ms.custom: hdinsightactive,seoapr2020
1010
ms.topic: faq
11-
ms.date: 07/19/2022
11+
ms.date: 02/06/2023
1212
title: "Azure HDInsight: Frequently asked questions"
1313
summary: |
1414
This article provides answers to some of the most common questions about how to run [Azure HDInsight](https://azure.microsoft.com/services/hdinsight/).
@@ -180,13 +180,40 @@ sections:
180180
Create a Kerberos keytab for your domain username. You can later use this keytab to authenticate to remote domain-joined clusters without entering a password. The domain name is uppercase:
181181
182182
```shell
183+
183184
ktutil
184-
ktutil: addent -password -p <username>@<DOMAIN.COM> -k 1 -e RC4-HMAC
185+
ktutil: addent -password -p <username>@<DOMAIN.COM> -k 1 -e aes256-cts-hmac-sha1-96
185186
Password for <username>@<DOMAIN.COM>: <password>
186187
ktutil: wkt <username>.keytab
187188
ktutil: q
188189
```
189190
191+
- question: |
192+
When is salting required for AES256 encryption when creating the keytab?
193+
answer: |
194+
If your TenantName & DomainName are different (example TenantName – [email protected] & DomainName – [email protected]), you need to add a SALT value using the -s option.
195+
196+
- question: |
197+
How do I determine the proper SALT value?
198+
answer: |
199+
1. Use an interactive Kerberos login to determine the proper salt value for the keytab. Interactive Kerberos login will use the highest encryption by default. Tracing should be enabled to observe the salt. Below is a sample Kerberos login:
200+
201+
```shell
202+
203+
$ KRB5_TRAACE=/dev/stdout kinit <username> -V
204+
```
205+
2. Look through the output for the salt "......." line.
206+
3. Use this salt value when creating the keytab.
207+
208+
```shell
209+
210+
ktutil
211+
ktutil: addent -password -p <username>@<DOMAIN.COM> -k 1 -e aes256-cts-hmac-sha1-96 -s <SALTvalue>
212+
Password for <username>@<DOMAIN.COM>: <password>
213+
ktutil: wkt <username>.keytab
214+
ktutil: q
215+
```
216+
190217
- question: |
191218
Can I use an existing Azure Active Directory tenant to create an HDInsight cluster that has the ESP?
192219
answer: |

0 commit comments

Comments
 (0)