Configuring Impersonation without Cluster Security
Describes how to use impersonation on a non-secure cluster.
About this task
To configure impersonation without enabling cluster security, perform the following steps on the client.
Procedure
- Enable impersonation for each ecosystem component you will use that supports impersonation. See Component Requirements for Impersonation in How Impersonation Works.
- Enable impersonation for the Data Fabric core components. See Enabling Impersonation for the mapr Superuser.
-
On each client system from which you want to use impersonation:
-
Set a
MAPR_IMPERSONATION_ENABLEDenvironment variable with the valuetrue. This value must be set in the environment of any process you start that does impersonation. -
Create a file in
/opt/mapr/conf/proxy/that has the name of the Data Fabric superuser or any other user. For the Data Fabric superuser, the default file name would bemapr. For all other users, use their username for the proxy file.
If the Data Fabric superuser has a different name in your cluster, use that name for the proxy file. To verify the Data Fabric superuser name, check themapr.daemon.user=line in the/opt/mapr/conf/daemon.conffile on a Data Fabric cluster server. -
Set a