You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/domain-joined/domain-joined-authentication-issues.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,16 @@ title: Authentication issues in Azure HDInsight
3
3
description: Authentication issues in Azure HDInsight
4
4
ms.service: hdinsight
5
5
ms.topic: troubleshooting
6
-
ms.date: 03/31/2022
6
+
ms.date: 04/28/2023
7
7
---
8
8
9
9
# Authentication issues in Azure HDInsight
10
10
11
11
This article describes troubleshooting steps and possible resolutions for issues when interacting with Azure HDInsight clusters.
12
12
13
-
On secure clusters backed by Azure Data Lake (Gen1 or Gen2), when domain users sign in to the cluster services through HDI Gateway (like signing in to the Apache Ambari portal), HDI Gateway will try to obtain an OAuth token from Azure Active Directory (Azure AD) first, and then get a Kerberos ticket from Azure AD DS. Authentication can fail in either of these stages. This article is aimed at debugging some of those issues.
13
+
On secure clusters backed by Azure Data Lake (Gen1 or Gen2), when domain users sign in to the cluster services through HDI Gateway (like signing in to the Apache Ambari portal), HDI Gateway tries to obtain an OAuth token from Azure Active Directory (Azure AD) first, and then get a Kerberos ticket from Azure AD DS. Authentication can fail in either of these stages. This article is aimed at debugging some of those issues.
14
14
15
-
When the authentication fails, you will get prompted for credentials. If you cancel this dialog, the error message will be printed. Here are some of the common error messages:
15
+
When the authentication fails, you gets prompted for credentials. If you cancel this dialog, the error message is printed. Here are some of the common error messages:
16
16
17
17
## invalid_grant or unauthorized_client, 50126
18
18
@@ -26,7 +26,7 @@ Reason: Bad Request, Detailed Response: {"error":"invalid_grant","error_descript
26
26
27
27
### Cause
28
28
29
-
Azure AD error code 50126 means the `AllowCloudPasswordValidation` policy has not been set by the tenant.
29
+
Azure AD error code 50126 means the `AllowCloudPasswordValidation` policy not set by the tenant.
30
30
31
31
### Resolution
32
32
@@ -41,12 +41,12 @@ The Global Administrator of the Azure AD tenant should enable Azure AD to use pa
41
41
Sign in fails with error code 50034. Error message is similar to:
42
42
43
43
```
44
-
{"error":"invalid_grant","error_description":"AADSTS50034: The user account Microsoft.AzureAD.Telemetry.Diagnostics.PII does not exist in the 0c349e3f-1ac3-4610-8599-9db831cbaf62 directory. To sign into this application, the account must be added to the directory.\r\nTrace ID: bbb819b2-4c6f-4745-854d-0b72006d6800\r\nCorrelation ID: b009c737-ee52-43b2-83fd-706061a72b41\r\nTimestamp: 2019-04-29 15:52:16Z", "error_codes":[50034],"timestamp":"2019-04-29 15:52:16Z","trace_id":"bbb819b2-4c6f-4745-854d-0b72006d6800", "correlation_id":"b009c737-ee52-43b2-83fd-706061a72b41"}
44
+
{"error":"invalid_grant","error_description":"AADSTS50034: The user account Microsoft.AzureAD.Telemetry.Diagnostics.PII doesn't exist in the 0c349e3f-1ac3-4610-8599-9db831cbaf62 directory. To sign into this application, the account must be added to the directory.\r\nTrace ID: bbb819b2-4c6f-4745-854d-0b72006d6800\r\nCorrelation ID: b009c737-ee52-43b2-83fd-706061a72b41\r\nTimestamp: 2019-04-29 15:52:16Z", "error_codes":[50034],"timestamp":"2019-04-29 15:52:16Z","trace_id":"bbb819b2-4c6f-4745-854d-0b72006d6800", "correlation_id":"b009c737-ee52-43b2-83fd-706061a72b41"}
45
45
```
46
46
47
47
### Cause
48
48
49
-
User name is incorrect (does not exist). The user is not using the same username that is used in Azure portal.
49
+
User name is incorrect (doesn't exist). The user isn't using the same username that is used in Azure portal.
The conditional access policy or MFA is being applied to the user. Since interactive authentication is not supported yet, the user or the cluster needs to be exempted from MFA / Conditional access. If you choose to exempt the cluster (IP address based exemption policy), then make sure that the AD `ServiceEndpoints` are enabled for that vnet.
105
+
The conditional access policy or MFA is being applied to the user. Since interactive authentication isn't supported yet, the user or the cluster needs to be exempted from MFA / Conditional access. If you choose to exempt the cluster (IP address based exemption policy), then make sure that the AD `ServiceEndpoints` are enabled for that vnet.
106
106
107
107
### Resolution
108
108
109
-
Use conditional access policy and exempt the HDInisght clusters from MFA as shown in [Configure a HDInsight cluster with Enterprise Security Package by using Azure Active Directory Domain Services](./apache-domain-joined-configure-using-azure-adds.md).
109
+
Use conditional access policy and exempt the HDInsight clusters from MFA as shown in [Configure a HDInsight cluster with Enterprise Security Package by using Azure Active Directory Domain Services](./apache-domain-joined-configure-using-azure-adds.md).
110
110
111
111
---
112
112
113
113
## Sign in denied
114
114
115
115
### Issue
116
116
117
-
Sign in is denied.
117
+
Sign in denied.
118
118
119
119
### Cause
120
120
121
-
To get to this stage, your OAuth authentication is not an issue, but Kerberos authentication is. If this cluster is backed by ADLS, OAuth sign in has succeeded before Kerberos auth is attempted. On WASB clusters, OAuth sign in is not attempted. There could be many reasons for Kerberos failure - like password hashes are out of sync, user account locked out in Azure AD DS, and so on. Password hashes sync only when the user changes password. When you create the Azure AD DS instance, it will start syncing passwords that are changed after the creation. It won't retroactively sync passwords that were set before its inception.
121
+
To get to this stage, your OAuth authentication isn't an issue, but Kerberos authentication is. If this cluster is backed by ADLS, OAuth sign in has succeeded before Kerberos auth is attempted. On WASB clusters, OAuth sign in isn't attempted. There could be many reasons for Kerberos failure - like password hashes are out of sync, user account locked out in Azure AD DS, and so on. Password hashes sync only when the user changes password. When you create the Azure AD DS instance, it will start syncing passwords that are changed after the creation. It can't retroactively sync passwords that were set before its inception.
122
122
123
123
### Resolution
124
124
125
125
If you think passwords may not be in sync, try changing the password and wait for a few minutes to sync.
126
126
127
-
Try to SSH into a You will need to try to authenticate (kinit) using the same user credentials, from a machine that is joined to the domain. SSH into the head / edge node with a local user and then run kinit.
127
+
Try to SSH into a You need to try to authenticate (kinit) using the same user credentials, from a machine that is joined to the domain. SSH into the head / edge node with a local user and then run kinit.
128
128
129
129
---
130
130
@@ -140,7 +140,7 @@ Varies.
140
140
141
141
### Resolution
142
142
143
-
For kinit to succeed, you need to know your `sAMAccountName` (this is the short account name without the realm). `sAMAccountName` is usually the account prefix (like bob in `[email protected]`). For some users, it could be different. You will need the ability to browse / search the directory to learn your `sAMAccountName`.
143
+
For kinit to succeed, you need to know your `sAMAccountName` (this is the short account name without the realm). `sAMAccountName` is usually the account prefix (like bob in `[email protected]`). For some users, it could be different. You need the ability to browse / search the directory to learn your `sAMAccountName`.
144
144
145
145
Ways to find `sAMAccountName`:
146
146
@@ -166,7 +166,7 @@ Incorrect username or password.
166
166
167
167
### Resolution
168
168
169
-
Check your username and password. Also check for other properties described above. To enable verbose debugging, run `export KRB5_TRACE=/tmp/krb.log` from the session before trying kinit.
169
+
Check your username and password. Also check for other properties described. To enable verbose debugging, run `export KRB5_TRACE=/tmp/krb.log` from the session before trying kinit.
170
170
171
171
---
172
172
@@ -178,7 +178,7 @@ Job / HDFS command fails due to `TokenNotFoundException`.
178
178
179
179
### Cause
180
180
181
-
The required OAuth access token was not found for the job / command to succeed. The ADLS / ABFS driver will try to retrieve the OAuth access token from the credential service before making storage requests. This token gets registered when you sign in to the Ambari portal using the same user.
181
+
The required OAuth access token wasn't found for the job / command to succeed. The ADLS / ABFS driver tries to retrieve the OAuth access token from the credential service before making storage requests. This token gets registered when you sign in to the Ambari portal using the same user.
0 commit comments