Skip to content

Commit de05bc2

Browse files
authored
Added client upgrade steps
1 parent d450af3 commit de05bc2

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

articles/hdinsight/domain-joined/identity-broker.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,14 @@ After ID Broker is enabled, you'll still need a password hash stored in Azure AD
5151

5252
SSH authentication requires the hash to be available in Azure AD DS. If you want to use SSH for administrative scenarios only, you can create one cloud-only account and use that to SSH to the cluster. Other users can still use Ambari or HDInsight tools (such as the IntelliJ plug-in) without having the password hash available in Azure AD DS.
5353

54+
## Clinets using OAuth to connect to HDInsight gateway with ID Broker setup
55+
56+
In the ID broker setup, custom apps and clients connecting to the gateway can be updated to acquire the required OAuth token first. You can follow the steps in this [document](https://docs.microsoft.com/en-us/azure/storage/common/storage-auth-aad-app) to acquire the token with the following information:
57+
58+
* OAuth resource uri: https://hib.azurehdinsight.net
59+
* AppId: 7865c1d2-f040-46cc-875f-831a1ef6a28a
60+
* Permission: (name: Cluster.ReadWrite, id:8f89faa0-ffef-4007-974d-4989b39ad77d)
61+
5462
## Next steps
5563

5664
* [Configure an HDInsight cluster with Enterprise Security Package by using Azure Active Directory Domain Services](apache-domain-joined-configure-using-azure-adds.md)

0 commit comments

Comments
 (0)