hadoop-common-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From aajis...@apache.org
Subject hadoop git commit: HADOOP-12873. Remove MRv1 terms from HttpAuthentication.md. Contributed by Brahma Reddy Battula.
Date Mon, 28 Mar 2016 07:01:35 GMT
Repository: hadoop
Updated Branches:
  refs/heads/trunk 18c7e5828 -> 01cfee638


HADOOP-12873. Remove MRv1 terms from HttpAuthentication.md. Contributed by Brahma Reddy Battula.


Project: http://git-wip-us.apache.org/repos/asf/hadoop/repo
Commit: http://git-wip-us.apache.org/repos/asf/hadoop/commit/01cfee63
Tree: http://git-wip-us.apache.org/repos/asf/hadoop/tree/01cfee63
Diff: http://git-wip-us.apache.org/repos/asf/hadoop/diff/01cfee63

Branch: refs/heads/trunk
Commit: 01cfee63815a1c9d63652edc21db63626df7e53c
Parents: 18c7e58
Author: Akira Ajisaka <aajisaka@apache.org>
Authored: Mon Mar 28 15:57:57 2016 +0900
Committer: Akira Ajisaka <aajisaka@apache.org>
Committed: Mon Mar 28 15:57:57 2016 +0900

----------------------------------------------------------------------
 .../hadoop-common/src/site/markdown/HttpAuthentication.md      | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/hadoop/blob/01cfee63/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
----------------------------------------------------------------------
diff --git a/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md b/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
index a003fe5..d4eeb0e 100644
--- a/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
+++ b/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
@@ -22,11 +22,11 @@ Introduction
 
 This document describes how to configure Hadoop HTTP web-consoles to require user authentication.
 
-By default Hadoop HTTP web-consoles (JobTracker, NameNode, TaskTrackers and DataNodes) allow
access without any form of authentication.
+By default Hadoop HTTP web-consoles (ResourceManager, NameNode, NodeManagers and DataNodes)
allow access without any form of authentication.
 
 Hadoop HTTP web-consoles can be configured to require Kerberos authentication using HTTP
SPNEGO protocol (supported by browsers like Firefox and Internet Explorer).
 
-In addition, Hadoop HTTP web-consoles support the equivalent of Hadoop's Pseudo/Simple authentication.
If this option is enabled, the user name must be specified in the first browser interaction
using the user.name query string parameter. e.g. `http://localhost:50030/jobtracker.jsp?user.name=babu`.
+In addition, Hadoop HTTP web-consoles support the equivalent of Hadoop's Pseudo/Simple authentication.
If this option is enabled, the user name must be specified in the first browser interaction
using the user.name query string parameter. e.g. `http://localhost:8088/cluster?user.name=babu`.
 
 If a custom authentication mechanism is required for the HTTP web-consoles, it is possible
to implement a plugin to support the alternate authentication mechanism (refer to Hadoop hadoop-auth
for details on writing an `AuthenticatorHandler`).
 
@@ -43,7 +43,7 @@ The following properties should be in the `core-site.xml` of all the nodes
in th
 | `hadoop.http.authentication.type`                      | `simple`                     
                 | Defines authentication used for the HTTP web-consoles. The supported values
are: `simple` \| `kerberos` \| `#AUTHENTICATION_HANDLER_CLASSNAME#`.                     
                                                                                         
                                                                                         
    |
 | `hadoop.http.authentication.token.validity`            | `36000`                      
                 | Indicates how long (in seconds) an authentication token is valid before
it has to be renewed.                                                                    
                                                                                         
                                                                                         
        |
 | `hadoop.http.authentication.token.max-inactive-interval` | `-1` (disabled)            
               | Specifies the time, in seconds, between client requests the server will invalidate
the token.                                                                               
                                                                                         
                                                                                       |
-| `hadoop.http.authentication.signature.secret.file`     | `$user.home/hadoop-http-auth-signature-secret`
| The signature secret file for signing the authentication tokens. The same secret should
be used for all nodes in the cluster, JobTracker, NameNode, DataNode and TastTracker. This
file should be readable only by the Unix user running the daemons.                       
                                                                                 |
+| `hadoop.http.authentication.signature.secret.file`     | `$user.home/hadoop-http-auth-signature-secret`
| The signature secret file for signing the authentication tokens. The same secret should
be used for all nodes in the cluster, ResourceManager, NameNode, DataNode and NodeManager.
This file should be readable only by the Unix user running the daemons.                  
                                                                                      |
 | `hadoop.http.authentication.cookie.domain`             |                              
                 | The domain to use for the HTTP cookie that stores the authentication token.
For authentication to work correctly across all nodes in the cluster the domain must be correctly
set. There is no default value, the HTTP cookie will not have a domain working only with the
hostname issuing the HTTP cookie.                                                  |
 | `hadoop.http.authentication.cookie.persistent`         | `false` (session cookie)     
                 | Specifies the persistence of the HTTP cookie. If the value is true, the
cookie is a persistent one. Otherwise, it is a session cookie. *IMPORTANT*: when using IP
addresses, browsers ignore cookies with domain settings. For this setting to work properly
all nodes in the cluster must be configured to generate URLs with `hostname.domain` names
on it. |
 | `hadoop.http.authentication.simple.anonymous.allowed`  | `true`                       
                 | Indicates whether anonymous requests are allowed when using 'simple' authentication.
                                                                                         
                                                                                         
                                                                                     |


Mime
View raw message