Configuring the Client Machine ODBC Connector on Secure Big Data Service Cluster
- Install MIT Kerberos Client on the Windows machine.
-
Copy the contents of
/etc/krb5.conf
from a cluster node to theC:\ProgramData\MIT\Kerberos5\krb5.ini
file. -
Collect Root CA certificate and the Trino Server certificate pem files, and then create a pem file to append both certificates.
Example:
C:\Users\opc\cloud.oracle.com.pem
- Create an MIT user principle and create its keytab.
-
Copy the keytab to the a Windows directory.
Example:
C:\Users\opc\admin.user.keytab
-
Be sure the Trino Coordinator's hostname .
If not, update the Windows host file at
C:\Windows\System32\drivers\etc\hosts
with the IP and hostname. - In Windows Search, search for and open ODBC Data Sources (64-bit).
- Click Add, and then select Simba Trino ODBC Driver.
- Click Finish.
-
Enter Simba Trino ODBC Driver DSN Setup details.
- In the Data Source Name field, enter a name for the data source.
- Select Kerberos Authentication for the Authentication Type.
- Check Use GSSAPI.
- Click Kinit Options to enter the user principal information.
- Complete one of the following:
- For Kinit with Keytab, enter the user principal information into the Kerberos Username and Keytab File Path fields.
- For Kinit with Password, enter the user principal information into the Kerberos Username and Keytab Password fields.
- Click OK.
-
Provide the following information:
- Service Name
- Enter Trino.
- Data Source Host
- Enter the BDS Trino Coordinator hostname.
- Port
- Enter 7778 for secure SSL enabled clusters.
- To configure SSL and provide certificate detail for the Trino certificate and its Root Certificate, click SSL Options.
- To test the connection, click Test.
- To save the setup, click OK.
- In the Catalog field, select Hive.
- In the Schema field, select the database you want to connect to. For example, default.