|
1 | 1 | ---
|
2 |
| -title: Configure a domain-joined HDInsight cluster by using Azure AD DS |
3 |
| -description: Learn how to set up and configure a domain-joined HDInsight cluster by using Azure Active Directory Domain Services |
| 2 | +title: Configure a HDInsight cluster with Enterprise Security Package by using Azure AD-DS |
| 3 | +description: Learn how to set up and configure a HDInsight Enterprise Security Package cluster by using Azure Active Directory Domain Services |
4 | 4 | services: hdinsight
|
5 | 5 | ms.service: hdinsight
|
6 | 6 | author: omidm1
|
7 | 7 | ms.author: omidm
|
8 | 8 | ms.reviewer: jasonh
|
9 | 9 | ms.topic: conceptual
|
10 |
| -ms.date: 07/17/2018 |
| 10 | +ms.date: 09/24/2018 |
11 | 11 | ---
|
12 |
| -# Configure a domain-joined HDInsight cluster by using Azure Active Directory Domain Services |
| 12 | +# Configure a HDInsight cluster with Enterprise Security Package by using Azure Active Directory Domain Services |
13 | 13 |
|
14 |
| -Domain-joined clusters provide multiuser access on Azure HDInsight clusters. Domain-joined HDInsight clusters are connected to a domain so that domain users can use their domain credentials to authenticate with the clusters and run big data jobs. |
| 14 | +Enterprise Security Package (ESP) clusters provide multi-user access on Azure HDInsight clusters. HDInsight clusters with ESP are connected to a domain so that domain users can use their domain credentials to authenticate with the clusters and run big data jobs. |
15 | 15 |
|
16 |
| -In this article, you learn how to configure a domain-joined HDInsight cluster by using Azure Active Directory Domain Services (Azure AD DS). |
| 16 | +In this article, you learn how to configure a HDInsight cluster with ESP by using Azure Active Directory Domain Services (Azure AD-DS). |
17 | 17 |
|
18 |
| -## Enable Azure AD DS |
| 18 | +>[!NOTE] |
| 19 | +>ESP is available in HDI 3.6+ for Spark, Interactive, and Hadoop. ESP for HBase cluster types is in preview. |
19 | 20 |
|
20 |
| -Enabling Azure AD DS is a prerequisite before you can create a domain-joined HDInsight cluster. For more information, see [Enable Azure Active Directory Domain Services using the Azure portal](../../active-directory-domain-services/active-directory-ds-getting-started.md). |
| 21 | + |
| 22 | +## Enable Azure AD-DS |
| 23 | + |
| 24 | +Enabling Azure AD-DS is a prerequisite before you can create a HDInsight cluster with ESP. For more information, see [Enable Azure Active Directory Domain Services using the Azure portal](../../active-directory-domain-services/active-directory-ds-getting-started.md). |
21 | 25 |
|
22 | 26 | > [!NOTE]
|
23 |
| -> Only tenant administrators have the privileges to create an Azure AD DS instance. If you use Azure Data Lake Storage Gen1 as the default storage for HDInsight, make sure that the default Azure AD tenant for Data Lake Storage Gen1 is same as the domain for the HDInsight cluster. Because Hadoop relies on Kerberos and basic authentication, multi-factor authentication needs to be disabled for users who will access the cluster. |
| 27 | +> Only tenant administrators have the privileges to create an Azure AD-DS instance. If you use Azure Data Lake Storage Gen1 as the default storage for HDInsight, make sure that the default Azure AD tenant for Data Lake Storage Gen1 is same as the domain for the HDInsight cluster. Because Hadoop relies on Kerberos and basic authentication, multi-factor authentication needs to be disabled for users who will access the cluster. |
24 | 28 |
|
25 |
| -After you provision the Azure AD DS instance, create a service account in Azure Active Directory (Azure AD) with the right permissions. If this service account already exists, reset its password and wait until it syncs to Azure AD DS. This reset will result in the creation of the Kerberos password hash, and it might take up to 30 minutes to sync to Azure AD DS. |
| 29 | +Secure LDAP is for an Azure AD-DS managed domain. When enabling LDAPS, put the domain name in the subject name or the alternative subject name in the certificate. For more information, see [Configure secure LDAP for an Azure AD-DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md). |
26 | 30 |
|
27 |
| -The service account needs the following privileges: |
| 31 | +## Add managed identity |
28 | 32 |
|
29 |
| -- Join machines to the domain and place machine principals within the OU that you specify during cluster creation. |
30 |
| -- Create service principals within the OU that you specify during cluster creation. |
| 33 | +After you enabled Azure AD-DS, create a managed identity and assign it to the **HDInsight Domain Services Contributor** role in Azure AD-DS Access control. |
31 | 34 |
|
32 |
| -> [!NOTE] |
33 |
| -> Because Apache Zeppelin uses the domain name to authenticate the administrative service account, the service account *must* have the same domain name as its UPN suffix for Apache Zeppelin to function properly. |
| 35 | + |
34 | 36 |
|
35 |
| -To learn more about OUs and how to manage them, see [Create an OU on an Azure AD DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-create-ou.md). |
| 37 | +For more information, see [What is managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md). |
36 | 38 |
|
37 |
| -Secure LDAP is for an Azure AD DS managed domain. For more information, see [Configure secure LDAP for an Azure AD DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md). |
| 39 | +## Create a HDInsight cluster with ESP |
38 | 40 |
|
39 |
| -## Create a domain-joined HDInsight cluster |
| 41 | +The next step is to create the HDInsight cluster with ESP enabled using Azure AD-DS. |
40 | 42 |
|
41 |
| -The next step is to create the HDInsight cluster by using Azure AD DS and the service account that you created in the previous section. |
| 43 | +It's easier to place both the Azure AD-DS instance and the HDInsight cluster in the same Azure virtual network. If you choose to put them in different virtual networks, you must peer those virtual networks so that HDInsight VMs have a line of sight to the domain controller for joining the VMs. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md). |
42 | 44 |
|
43 |
| -It's easier to place both the Azure AD DS instance and the HDInsight cluster in the same Azure virtual network. If you choose to put them in different virtual networks, you must peer those virtual networks so that HDInsight VMs have a line of sight to the domain controller for joining the VMs. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md). |
| 45 | +When you create an HDInsight cluster, you have the option to enable Enterprise Security Package to connect your cluster with Azure AD-DS. |
44 | 46 |
|
45 |
| -When you create a domain-joined HDInsight cluster, you must supply the following parameters: |
| 47 | + |
46 | 48 |
|
47 |
| -- **Domain name**: The domain name that's associated with Azure AD DS. An example is contoso.onmicrosoft.com. |
| 49 | +Once you enable ESP, common misconfigurations related to Azure AD-DS will be automatically detected and validated. |
48 | 50 |
|
49 |
| -- **Domain user name**: The service account in the Azure ADDS DC managed domain that you created in the previous section. An example is [email protected]. This domain user will be the administrator of this HDInsight cluster . |
| 51 | + |
50 | 52 |
|
51 |
| -- **Domain password**: The password of the service account. |
| 53 | +Early detection saves time by allowing you to fix errors before creating the cluster. |
52 | 54 |
|
53 |
| -- **Organizational unit**: The distinguished name of the OU that you want to use with the HDInsight cluster. An example is OU=HDInsightOU,DC=contoso,DC=onmicrosoft,DC=com. If this OU does not exist, the HDInsight cluster tries to create the OU by using the privileges that the service account has. For example, if the service account is in the Azure AD DS Administrators group, it has the right permissions to create an OU. Otherwise, you need to create the OU first and give the service account full control over that OU. For more information, see [Create an OU on an Azure AD DS managed domain](../../active-directory-domain-services/active-directory-ds-admin-guide-create-ou.md). |
| 55 | + |
54 | 56 |
|
55 |
| - > [!IMPORTANT] |
56 |
| - > Include all of the DCs, separated by commas, after the OU (for example, OU=HDInsightOU,DC=contoso,DC=onmicrosoft,DC=com). |
| 57 | +When you create a HDInsight cluster with ESP, you must supply the following parameters: |
| 58 | + |
| 59 | +- **Cluster admin user**: Choose an admin for your cluster from your synced Azure AD-DS. |
| 60 | + |
| 61 | +- **Cluster access groups**: The security groups whose users you want to sync to the cluster should be synced and available in Azure AD-DS. For example, HiveUsers. If you want to specify multiple user groups, separate them by semicolon ‘;’. The group(s) must exist in the directory prior to provisioning. For more information, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md). If the group does not exist, an error occurs: "Group HiveUsers not found in the Active Directory." |
57 | 62 |
|
58 | 63 | - **LDAPS URL**: An example is ldaps://contoso.onmicrosoft.com:636.
|
59 | 64 |
|
60 | 65 | > [!IMPORTANT]
|
61 | 66 | > Enter the complete URL, including "ldaps://" and the port number (:636).
|
62 | 67 |
|
63 |
| -- **Access user group**: The security groups whose users you want to sync to the cluster. For example, HiveUsers. If you want to specify multiple user groups, separate them by semicolon ‘;’. The group(s) must exist in the directory prior to provisioning. For more information, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md). If the group does not exist, an error occurs: "Group HiveUsers not found in the Active Directory." |
64 |
| - |
65 | 68 | The following screenshot shows the configurations in the Azure portal:
|
66 | 69 |
|
67 |
| - . |
| 70 | + . |
68 | 71 |
|
69 | 72 |
|
70 | 73 | ## Next steps
|
71 |
| -* For configuring Hive policies and running Hive queries, see [Configure Hive policies for domain-joined HDInsight clusters](apache-domain-joined-run-hive.md). |
72 |
| -* For using SSH to connect to domain-joined HDInsight clusters, see [Use SSH with Linux-based Hadoop on HDInsight from Linux, Unix, or OS X](../hdinsight-hadoop-linux-use-ssh-unix.md#domainjoined). |
| 74 | +* For configuring Hive policies and running Hive queries, see [Configure Hive policies for HDInsight clusters with ESP](apache-domain-joined-run-hive.md). |
| 75 | +* For using SSH to connect to HDInsight clusters with ESP, see [Use SSH with Linux-based Hadoop on HDInsight from Linux, Unix, or OS X](../hdinsight-hadoop-linux-use-ssh-unix.md#domainjoined). |
73 | 76 |
|
0 commit comments