Repository: hadoop
Updated Branches:
  refs/heads/branch-2.8 25b476e93 -> b029011a2


HADOOP-12873. Remove MRv1 terms from HttpAuthentication.md. Contributed by 
Brahma Reddy Battula.

(cherry picked from commit 01cfee63815a1c9d63652edc21db63626df7e53c)
(cherry picked from commit 42d312663fd1399d4b5eaa99584090ddaaec1d9b)


Project: http://git-wip-us.apache.org/repos/asf/hadoop/repo
Commit: http://git-wip-us.apache.org/repos/asf/hadoop/commit/b029011a
Tree: http://git-wip-us.apache.org/repos/asf/hadoop/tree/b029011a
Diff: http://git-wip-us.apache.org/repos/asf/hadoop/diff/b029011a

Branch: refs/heads/branch-2.8
Commit: b029011a23005ec6d6d25629aaf6fe8d69062891
Parents: 25b476e
Author: Akira Ajisaka <aajis...@apache.org>
Authored: Mon Mar 28 15:57:57 2016 +0900
Committer: Akira Ajisaka <aajis...@apache.org>
Committed: Mon Mar 28 15:58:40 2016 +0900

----------------------------------------------------------------------
 .../hadoop-common/src/site/markdown/HttpAuthentication.md      | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/hadoop/blob/b029011a/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
----------------------------------------------------------------------
diff --git 
a/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md 
b/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
index a003fe5..d4eeb0e 100644
--- 
a/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
+++ 
b/hadoop-common-project/hadoop-common/src/site/markdown/HttpAuthentication.md
@@ -22,11 +22,11 @@ Introduction
 
 This document describes how to configure Hadoop HTTP web-consoles to require 
user authentication.
 
-By default Hadoop HTTP web-consoles (JobTracker, NameNode, TaskTrackers and 
DataNodes) allow access without any form of authentication.
+By default Hadoop HTTP web-consoles (ResourceManager, NameNode, NodeManagers 
and DataNodes) allow access without any form of authentication.
 
 Hadoop HTTP web-consoles can be configured to require Kerberos authentication 
using HTTP SPNEGO protocol (supported by browsers like Firefox and Internet 
Explorer).
 
-In addition, Hadoop HTTP web-consoles support the equivalent of Hadoop's 
Pseudo/Simple authentication. If this option is enabled, the user name must be 
specified in the first browser interaction using the user.name query string 
parameter. e.g. `http://localhost:50030/jobtracker.jsp?user.name=babu`.
+In addition, Hadoop HTTP web-consoles support the equivalent of Hadoop's 
Pseudo/Simple authentication. If this option is enabled, the user name must be 
specified in the first browser interaction using the user.name query string 
parameter. e.g. `http://localhost:8088/cluster?user.name=babu`.
 
 If a custom authentication mechanism is required for the HTTP web-consoles, it 
is possible to implement a plugin to support the alternate authentication 
mechanism (refer to Hadoop hadoop-auth for details on writing an 
`AuthenticatorHandler`).
 
@@ -43,7 +43,7 @@ The following properties should be in the `core-site.xml` of 
all the nodes in th
 | `hadoop.http.authentication.type`                      | `simple`            
                           | Defines authentication used for the HTTP 
web-consoles. The supported values are: `simple` \| `kerberos` \| 
`#AUTHENTICATION_HANDLER_CLASSNAME#`.                                           
                                                                                
                                                                                
   |
 | `hadoop.http.authentication.token.validity`            | `36000`             
                           | Indicates how long (in seconds) an authentication 
token is valid before it has to be renewed.                                     
                                                                                
                                                                                
                                                            |
 | `hadoop.http.authentication.token.max-inactive-interval` | `-1` (disabled)   
                         | Specifies the time, in seconds, between client 
requests the server will invalidate the token.                                  
                                                                                
                                                                                
                                                               |
-| `hadoop.http.authentication.signature.secret.file`     | 
`$user.home/hadoop-http-auth-signature-secret` | The signature secret file for 
signing the authentication tokens. The same secret should be used for all nodes 
in the cluster, JobTracker, NameNode, DataNode and TastTracker. This file 
should be readable only by the Unix user running the daemons.                   
                                                                                
      |
+| `hadoop.http.authentication.signature.secret.file`     | 
`$user.home/hadoop-http-auth-signature-secret` | The signature secret file for 
signing the authentication tokens. The same secret should be used for all nodes 
in the cluster, ResourceManager, NameNode, DataNode and NodeManager. This file 
should be readable only by the Unix user running the daemons.                   
                                                                                
      |
 | `hadoop.http.authentication.cookie.domain`             |                     
                           | The domain to use for the HTTP cookie that stores 
the authentication token. For authentication to work correctly across all nodes 
in the cluster the domain must be correctly set. There is no default value, the 
HTTP cookie will not have a domain working only with the hostname issuing the 
HTTP cookie.                                                  |
 | `hadoop.http.authentication.cookie.persistent`         | `false` (session 
cookie)                       | Specifies the persistence of the HTTP cookie. 
If the value is true, the cookie is a persistent one. Otherwise, it is a 
session cookie. *IMPORTANT*: when using IP addresses, browsers ignore cookies 
with domain settings. For this setting to work properly all nodes in the 
cluster must be configured to generate URLs with `hostname.domain` names on it. 
|
 | `hadoop.http.authentication.simple.anonymous.allowed`  | `true`              
                           | Indicates whether anonymous requests are allowed 
when using 'simple' authentication.                                             
                                                                                
                                                                                
                                                             |

Reply via email to