This tab allows you to configure the Data Catalog to use Kerberos to authenticate the users with Virtual DataPort by using Single Sign On, which means that the Data Catalog users will not have to provide their credentials.
Before configuring Kerberos in the Data Catalog, you need to configure the Kerberos authentication in the Virtual DataPort servers to which the Data Catalog is going to authenticate its users. To do that, follow the instructions of the postinstallation task Setting-up Kerberos Authentication in the Data Catalog of the Installation Guide and then, the instructions of the section Kerberos Authentication of the Virtual DataPort Administration Guide.
Finally, set-up the Kerberos authentication in the Data Catalog. In the wizard to do it (see figure below), provide the following details:
Select Use Kerberos.
In the box Server Principal enter the “Service Principal Name” (SPN) used to create the keytab file. That is, the SPN with the Fully Qualified Domain Name (FQDN) of the server where the Data Catalog is running. For example, “HTTP/denodo-prod.subnet1.contoso.com@CONTOSO.COM”.
In the box Keytab file enter the path to the keytab file.
Leave the Kerberos configuration file box empty unless the host where this Data Catalog runs does not belong to a Kerberos realm (e.g. a Windows Active Directory domain). If this host does not belong to a Kerberos realm, do one of the following:
- Enter the path to the
krb5.inifile with the Kerberos settings.
- Or follow the steps described in the appendix Using Kerberos Authentication in Virtual DataPort Without Joining a Kerberos Realm of the Installation Guide.
- Enter the path to the
We recommend selecting the check box Activate Kerberos debug mode the first time you set up Kerberos in case you run into any issues. Once Kerberos has been set up, disable this.
When this option is enabled, check the appendix How to Debug Kerberos in Web Applications of the Installation Guide to learn how to see the debug information.
Then, restart the Data Catalog to have these changes take effect. The next time you launch the tool (and if everything is correctly configured) you will see a new dialog in the login screen (Single Sign On Login) to authenticate by using Single Sign On (you cannot use Kerberos along with login and password) against the chosen VDP server. In order to succeed, it is necessary that the URL in the browser points to the FQDN configured in previous steps (for instance, http://host1.subnet1.contoso.com/…).
If you misconfigure the Kerberos settings and then you are not able to log in, you have to enter the URL (http://localhost:9090/denodo-data-catalog/LoginLocal) in order to log in with the local admin user to modify the Kerberos configuration.