Data Engineering Administrator Guide > Authorization > Key Management Servers
  

Key Management Servers

Key Management Server (KMS) is an open source key management service that supports HDFS data at rest encryption. You can use the cluster administration utility to configure the KMS for Informatica user access.
You can use the following key management servers to encrypt the data at rest:
KMS enables the following functions:
Key management
You can create, update, or delete encryption key zones that control access to functionality.
Access control policies
You can administer access control policies for encryption keys. You can create or edit keys to control access by users to functionality.

Configuring KMS for Informatica User Access

If you use a KMS to encrypt HDFS data at rest, use the cluster administration utility to configure the KMS for Informatica user access.
    1. Create a KMS user account for the Informatica user. Add the Informatica user to a new KMS repository, or to an existing KMS repository.
    The user corresponds to the Data Integration Service user or the Kerberos SPN user.
    2. Grant permissions to the Informatica user.
    3. Create and configure an encryption key.
    4. Create an encryption zone that uses the encryption key you created.
    For example:
    hdfs dfs -mkdir /zone_encr_infa
    hdfs crypto -createZone -keyName infa_key -path /zone_encr_infa
    5. Browse to the Custom KMS Site page and add the following properties:
    hadoop.kms.proxyuser.<user>.groups=*
    hadoop.kms.proxyuser.<user>.hosts=*
    hadoop.kms.proxyuser.<user>.users=*
    where <user> is the Informatica user name you configured in Step 1.
    6. Update the following properties:
    hadoop.kms.proxyuser.<user>.hosts
    hadoop.kms.proxyuser.<user>.groups
    7. Search for proxyuser in the KMS Configurations area. To register all Hadoop system users with the KMS, add the following properties:
    hadoop.kms.proxyuser.HTTP.hosts=*
    hadoop.kms.proxyuser.HTTP.users=*
    hadoop.kms.proxyuser.hive.hosts=*
    hadoop.kms.proxyuser.hive.users=*
    hadoop.kms.proxyuser.keyadmin.hosts=*
    hadoop.kms.proxyuser.keyadmin.users=*
    hadoop.kms.proxyuser.nn.hosts=*
    hadoop.kms.proxyuser.nn.users=*
    hadoop.kms.proxyuser.rm.hosts=*
    hadoop.kms.proxyuser.rm.users=*
    hadoop.kms.proxyuser.yarn.hosts=*
    hadoop.kms.proxyuser.yarn.users=*