Describes types of authentication available with the HPE Ezmeral Data Fabric and how to manage user authentication with the
maprlogin utility.
Authentication ensures that who you really are and who you claim to be, match when identifying the end user to the system. data-fabric authentication supports standard Basic Authentication and SPNEGO authentication for web-based interfaces, and supports data-fabric tickets for many of the core system component non-web-based interfaces. A ticket is an object that contains specific information about a user, an expiration time, and a key. Tickets uniquely identify a user and are encrypted to protect their contents. You can use tickets to establish sessions between a user and the cluster.
Data Fabric supports two methods of authenticating a user and generating a ticket: a username-password pair and Kerberos. Both of these methods are mediated by the maprlogin utility. When you authenticate with a username-password pair, the system verifies your credentials using Pluggable Authentication Modules (PAM). You can configure the cluster to use any registry that has a PAM module.
Data Fabric tickets contain the following information:
A data-fabric ticket determines the user's identity. The system uses the ticket as the basis for authorization. A data-fabric cluster with security features enabled does not rely on the client-side operating system identity.
The maprlogin utility supports user
authentication with either username and password, or Kerberos to generate a unique session
token called a ticket. The following diagram outlines the process flow:

Data Fabric tickets are either
implicitly or explicitly generated. On clusters that use Kerberos for authentication, a user
that runs a data-fabric command
without first using the maprlogin utility implicitly obtains a data-fabric ticket. During usage, the
client runtime process first checks for a valid user ticket, and uses that ticket if it
exists. If a ticket does not exist, the runtime process checks if Kerberos is enabled for
the cluster and then checks for an existing valid Kerberos identity. When a valid Kerberos
identity is found, the client implicitly generates a ticket for that Kerberos identity.
When you explicitly generate a ticket, you can authenticate either with your username and password, or with Kerberos:
maprlogin utility, which
connects to a CLDB node in the cluster using HTTPS. The host name for the CLDB node is
specified in the mapr-clusters.conf file. The JAAS configuration is
specified in the mapr.login.conf file. The system can use any registry that has
a PAM module available.
keytab file.getpwnam_r and getgrouplist, which are controlled by
the /etc/nsswitch.conf file, to determine the user IDs and group
IDs.mapr
user. Privileged identities have impersonation functionality enabled.