<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAS Hadoop Connection - Kerberos Question in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925435#M28421</link>
    <description>Aha I was hoping you would reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  we are not opting for the MIT KDC setup, instead going this route of updating WIN registry, per Stuart's article (M2).  I was looking at Cloudera's JDBC Hive driver and its manual, even they mention setting up separate MIT KDC and to get file based ticket and KRB5CCNAME setup.  Is there a way to figure out to get the memory value just so the ticket could be validated?  Like one could put for KRB5CCNAME?  Since I have your attention, por favor, I was unclear if I needed to set JAAS config if I am going with memory setup?&lt;BR /&gt;&lt;BR /&gt;Much thanks for your input and time!</description>
    <pubDate>Tue, 23 Apr 2024 19:11:15 GMT</pubDate>
    <dc:creator>shoin</dc:creator>
    <dc:date>2024-04-23T19:11:15Z</dc:date>
    <item>
      <title>SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925262#M28411</link>
      <description>&lt;P&gt;SAS 9.4 M8 WIN 2022 server ACCESS/Hadoop&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is an article by the Guru Stuart Rogers RE. Hadoop Deployment - Kerberos and I am looking for some further clarifications:&lt;/P&gt;
&lt;P&gt;1. For WIN environment, if separate MIT KDC setup is not an option, will WIN registry update still work "REG_DWORD key AllowTgtSessionKey registry key" ?&lt;/P&gt;
&lt;P&gt;2. There is a script SAS provides (SAS TS) for Linux that could be placed in WorkspaceServer_usermods.sh where TGT is searched for the user that started the session, should that be done for SAS WIN based work space server too?&lt;/P&gt;
&lt;P&gt;3. There is a requirement for Java Unlimited strength policy files, with SAS using Zulu (Azul) JRE, does anyone know the download URL or is it now packaged automatically with new SAS bundled JREs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;S&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 18:57:50 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925262#M28411</guid>
      <dc:creator>shoin</dc:creator>
      <dc:date>2024-04-22T18:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925276#M28412</link>
      <description>Here's the relevant documentation on this:&lt;BR /&gt;&lt;BR /&gt;Configuring Client Machines to Use Integrated Windows Authentication&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/bicdc/9.4/bisecag/n1ocmfw9o3fbmhn1p3jb4y5py6ci.htm#n0r9447nh9jltzn1txvxk10qc8h9" target="_blank"&gt;https://go.documentation.sas.com/doc/en/bicdc/9.4/bisecag/n1ocmfw9o3fbmhn1p3jb4y5py6ci.htm#n0r9447nh9jltzn1txvxk10qc8h9&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This has a link to the cryptographic extensions and discusses the registry key. You would not need to set up a script to search for your TGT in Windows as the key is stored in memory.</description>
      <pubDate>Mon, 22 Apr 2024 19:45:25 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925276#M28412</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-04-22T19:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925435#M28421</link>
      <description>Aha I was hoping you would reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  we are not opting for the MIT KDC setup, instead going this route of updating WIN registry, per Stuart's article (M2).  I was looking at Cloudera's JDBC Hive driver and its manual, even they mention setting up separate MIT KDC and to get file based ticket and KRB5CCNAME setup.  Is there a way to figure out to get the memory value just so the ticket could be validated?  Like one could put for KRB5CCNAME?  Since I have your attention, por favor, I was unclear if I needed to set JAAS config if I am going with memory setup?&lt;BR /&gt;&lt;BR /&gt;Much thanks for your input and time!</description>
      <pubDate>Tue, 23 Apr 2024 19:11:15 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925435#M28421</guid>
      <dc:creator>shoin</dc:creator>
      <dc:date>2024-04-23T19:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925445#M28422</link>
      <description>Is this the article from Stuart Rogers you're referencing?&lt;BR /&gt;&lt;BR /&gt;SAS® 9.4 on Microsoft Windows: Unleashing Kerberos on Apache Hadoop&lt;BR /&gt;&lt;A href="https://support.sas.com/resources/papers/proceedings18/1878-2018.pdf" target="_blank"&gt;https://support.sas.com/resources/papers/proceedings18/1878-2018.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The "MICROSOFT WINDOWS CHALLENGES" section I believe is what we're referencing.&lt;BR /&gt;&lt;BR /&gt;I don't think you need to set anything in KRB5CCNAME, this is all handled by the Windows kerberos libraries. &lt;BR /&gt;&lt;BR /&gt;I believe the configuration of IWA using jaas.config would be the same.&lt;BR /&gt;&lt;BR /&gt;From the document, the registry key setting is what let's the Java process spawned by the Workspace Server access the in memory token when it does not use the GSS-API.&lt;BR /&gt;&lt;BR /&gt;From this documentation from Microsoft, the AllowTgtSessionKey registry entry is not enabled if UAC is turned on, which seems to be a progression from what Stuart described in his paper:&lt;BR /&gt;&lt;BR /&gt;"With active Credential Guard in Windows 10 and later versions of Windows, you can't enable sharing the TGT session keys with applications anymore."&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys" target="_blank"&gt;https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Microsoft Windows Defender Credential Guard&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/bicdc/9.4/bisecag/n1b9dyri8d3laxn1vam7bhew73cu.htm" target="_blank"&gt;https://go.documentation.sas.com/doc/en/bicdc/9.4/bisecag/n1b9dyri8d3laxn1vam7bhew73cu.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Apr 2024 19:57:33 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925445#M28422</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-04-23T19:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925620#M28432</link>
      <description>&lt;P&gt;Much thanks, I think at this stage I am attempting to set kerberos outbound only.&lt;BR /&gt;1. Asked for uncontrained trusted for delegation&lt;BR /&gt;2. Found this linek for unlimited JCE &lt;A href="https://support.azul.com/hc/en-us/articles/115001122623-Java-Cryptography-Extension-JCE-for-Azul-Zulu-and-Azul-Zing?input_string=jce+unlimited+strength+jurisdiction+policy+files" target="_blank"&gt;https://support.azul.com/hc/en-us/articles/115001122623-Java-Cryptography-Extension-JCE-for-Azul-Zulu-and-Azul-Zing?input_string=jce+unlimited+strength+jurisdiction+policy+files&lt;/A&gt;&amp;nbsp; looks like do not need to download and provide.&lt;BR /&gt;3. Will ask to review the URLs you shared re. WIN specific issues&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Greg, I did run klist on sas server and received output, however, when I did that from klist in SAS private JRE location I received the "&lt;STRONG&gt;credentials cache&amp;nbsp; C:\Users\my-id\krb5ccname_my-id not found&lt;/STRONG&gt;&amp;nbsp;I have not enabled desktop IWA yet nor did the jaas.config implemented, would that be the issue? I did have the AllowTgtSessionKey set.&lt;/P&gt;
&lt;P&gt;I do appreciate these insights!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 18:12:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925620#M28432</guid>
      <dc:creator>shoin</dc:creator>
      <dc:date>2024-04-24T18:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Hadoop Connection - Kerberos Question</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925643#M28436</link>
      <description>You might need to run kinit from that same path for klist to produce results.</description>
      <pubDate>Wed, 24 Apr 2024 19:32:03 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Hadoop-Connection-Kerberos-Question/m-p/925643#M28436</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-04-24T19:32:03Z</dc:date>
    </item>
  </channel>
</rss>

