This is an automated email from the ASF dual-hosted git repository. shaofengshi pushed a commit to branch document in repository https://gitbox.apache.org/repos/asf/kylin.git
The following commit(s) were added to refs/heads/document by this push: new 789d565 update howto_ldap document 789d565 is described below commit 789d56571af39b323b3edaa0dae3c880a9a9cff2 Author: shaofengshi <shaofeng...@apache.org> AuthorDate: Sat Oct 13 22:36:14 2018 +0800 update howto_ldap document --- website/_docs/howto/howto_ldap_and_sso.md | 16 ++++++++-------- website/_docs21/howto/howto_ldap_and_sso.md | 14 +++++++------- website/_docs23/howto/howto_ldap_and_sso.md | 14 +++++++------- website/_docs24/howto/howto_ldap_and_sso.md | 14 +++++++------- 4 files changed, 29 insertions(+), 29 deletions(-) diff --git a/website/_docs/howto/howto_ldap_and_sso.md b/website/_docs/howto/howto_ldap_and_sso.md index 762d7d8..8e0a3aa 100644 --- a/website/_docs/howto/howto_ldap_and_sso.md +++ b/website/_docs/howto/howto_ldap_and_sso.md @@ -21,24 +21,24 @@ java -classpath kylin-server-base-\<versioin\>.jar:kylin-core-common-\<versioin\ Config them in the conf/kylin.properties: ``` -ldap.server=ldap://<your_ldap_host>:<port> -ldap.username=<your_user_name> -ldap.password=<your_password_encrypted> +kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port> +kylin.security.ldap.connection-username=<your_user_name> +kylin.security.ldap.connection-password=<your_password_encrypted> ``` Secondly, provide the user search patterns, this is by LDAP design, here is just a sample: ``` -ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com -ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) -ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com +kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com +kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) +kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com ``` -If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty; +If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-.*; Otherwise, leave them be empty; ### Configure the administrator group -To map an LDAP group to the admin group in Kylin, need set the "kylin.security.acl.admin-role" to the LDAP group name(shall keep the original case), and the users in this group will be global admin in Kylin. +To map an LDAP group to the admin group in Kylin, need set the "kylin.security.acl.admin-role" to the LDAP group name (shall keep the original case), and the users in this group will be global admin in Kylin. For example, in LDAP the group "KYLIN-ADMIN-GROUP" is the list of administrators, here need set it as: diff --git a/website/_docs21/howto/howto_ldap_and_sso.md b/website/_docs21/howto/howto_ldap_and_sso.md index 945a9fc..1a7442d 100644 --- a/website/_docs21/howto/howto_ldap_and_sso.md +++ b/website/_docs21/howto/howto_ldap_and_sso.md @@ -21,20 +21,20 @@ java -classpath kylin-server-base-\<versioin\>.jar:spring-beans-3.2.17.RELEASE.j Config them in the conf/kylin.properties: ``` -ldap.server=ldap://<your_ldap_host>:<port> -ldap.username=<your_user_name> -ldap.password=<your_password_encrypted> +kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port> +kylin.security.ldap.connection-username=<your_user_name> +kylin.security.ldap.connection-password=<your_password_encrypted> ``` Secondly, provide the user search patterns, this is by LDAP design, here is just a sample: ``` -ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com -ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) -ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com +kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com +kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) +kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com ``` -If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty; +If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty; ### Configure the administrator group and default role diff --git a/website/_docs23/howto/howto_ldap_and_sso.md b/website/_docs23/howto/howto_ldap_and_sso.md index bae5be0..060630f 100644 --- a/website/_docs23/howto/howto_ldap_and_sso.md +++ b/website/_docs23/howto/howto_ldap_and_sso.md @@ -21,20 +21,20 @@ java -classpath kylin-server-base-\<versioin\>.jar:kylin-core-common-\<versioin\ Config them in the conf/kylin.properties: ``` -ldap.server=ldap://<your_ldap_host>:<port> -ldap.username=<your_user_name> -ldap.password=<your_password_encrypted> +kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port> +kylin.security.ldap.connection-username=<your_user_name> +kylin.security.ldap.connection-password=<your_password_encrypted> ``` Secondly, provide the user search patterns, this is by LDAP design, here is just a sample: ``` -ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com -ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) -ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com +kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com +kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) +kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com ``` -If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty; +If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty; ### Configure the administrator group diff --git a/website/_docs24/howto/howto_ldap_and_sso.md b/website/_docs24/howto/howto_ldap_and_sso.md index f0840fa..409177e 100644 --- a/website/_docs24/howto/howto_ldap_and_sso.md +++ b/website/_docs24/howto/howto_ldap_and_sso.md @@ -21,20 +21,20 @@ java -classpath kylin-server-base-\<versioin\>.jar:kylin-core-common-\<versioin\ Config them in the conf/kylin.properties: ``` -ldap.server=ldap://<your_ldap_host>:<port> -ldap.username=<your_user_name> -ldap.password=<your_password_encrypted> +kylin.security.ldap.connection-server=ldap://<your_ldap_host>:<port> +kylin.security.ldap.connection-username=<your_user_name> +kylin.security.ldap.connection-password=<your_password_encrypted> ``` Secondly, provide the user search patterns, this is by LDAP design, here is just a sample: ``` -ldap.user.searchBase=OU=UserAccounts,DC=mycompany,DC=com -ldap.user.searchPattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) -ldap.user.groupSearchBase=OU=Group,DC=mycompany,DC=com +kylin.security.ldap.user-search-base=OU=UserAccounts,DC=mycompany,DC=com +kylin.security.ldap.user-search-pattern=(&(cn={0})(memberOf=CN=MYCOMPANY-USERS,DC=mycompany,DC=com)) +kylin.security.ldap.user-group-search-base=OU=Group,DC=mycompany,DC=com ``` -If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in ldap.service.*; Otherwise, leave them be empty; +If you have service accounts (e.g, for system integration) which also need be authenticated, configure them in kylin.security.ldap.service-*; Otherwise, leave them be empty; ### Configure the administrator group