Hue is a web application that provides an end-user focused interface for a large number of the projects in the Hadoop ecosystem. When Hadoop is configured with Kerberos authentication, then Hue must be configured with Kerberos credentials to properly access Hadoop. Kerberos is enabled by setting the following parameters in the hue.ini file:
The Kerberos principal name for the Hue, including the fully qualified domain name of the Hue server
The path to the Kerberos keytab file containing Hue’s service credentials
The path to the Kerberos
kinit command (not needed if
kinit is on the path)
The frequency in seconds for Hue to renew its Kerberos tickets
These settings should be placed under the
[[kerberos]] subsection of the
[desktop] top-level section in the hue.ini file. See Example 12-1 for a sample Hue kerberos configuration.
Hue has its own set of authentication backends and authenticates against Hadoop and other projects using Kerberos. In order to perform actions on behalf of other users, Hadoop must be configured to trust the Hue service. This is done by configuring Hadoop’s proxy user/user impersonation capabilities. This is controlled by setting the hosts Hue can run on and the groups of users that Hue can impersonate. ...