Enabling kerberos authentication in Federation server for an ODBC wrapper
Kerberos is a secure network authentication protocol that employs a system of shared secret keys to authenticate a user in an unsecured network environment. Kerberos is designed for academic and enterprise organizations where there is a single source of truth regarding identify, authentication and authorization.
Before you begin
About this task
Kerberos authentication is managed by a three-tiered system in which encrypted service tickets, rather than a plain-text user ID and password pair, are exchanged between the application server and client. These encrypted service tickets, called credentials, are provided by a separate server called the Kerberos Key Distribution Center (KDC). Each user, or principal in Kerberos terms, possesses a private encryption key that is shared with the KDC.
One of key feature of Kerberos is that it provides a single sign-on environment that enables a user to connect to a federation server without providing a user ID or password.
- Driver for Apache Hive
- DB2® Wire Protocol
- Greenplum Wire Protocol
- Impala Wire Protocol
- Oracle Wire Protocol
- PostgreSQL Wire Protocol
- SQL Server Wire Protocol
- Sybase Wire Protocol
- Driver for the Teradata Database
Procedure
The following procedure describes the steps required to enable kerberos authentication in a federation server for an ODBC wrapper. This method supports both Windows Active Directory Kerberos and MIT Kerberos environments.