Configuring Kerberos Connection Information for Clients

Install Kerberos clients and configure the Kerberos realm and connection details.


From your organization’s Kerberos administrator, get the krb5.conf configured for domain that contains the DataStax cluster.


  1. Install Kerberos client software on each node using one of the following methods:

    • Tarball-based systems:

    • RHEL-based systems:

      sudo yum install krb5-workstation krb5-libs krb5-pkinit-openssl
    • Debian-based systems:

      sudo apt-get install krb5-user krb5-config krb5-pkinit
  2. Optional: In the krb5.conf file, verify that the libdefaults settings have Domain Name System (DNS) and realm lookup disabled.

    dns_lookup_kdc = false
    dns_lookup_realm = false

    DataStax recommends not using DNS lookup for Kerberos Key Distribution Center (KDC) and Realm entries. Relying on DNS may negatively impact performance and functionality.

  3. Distribute the configuration file to each node using one of the following methods:

    • Default location - Put the krb5.conf file in the /etc directory.

    • Custom location - When the krb5.conf file is in a location other than the default, provide the location using environment variable KRB5_CONFIG.

      export KRB5_CONFIG="path_to_file"

      Refer to MIT Kerberos documentation for full list of default paths.

Was this helpful?

Give Feedback

How can we improve the documentation?

© 2024 DataStax | Privacy policy | Terms of use

Apache, Apache Cassandra, Cassandra, Apache Tomcat, Tomcat, Apache Lucene, Apache Solr, Apache Hadoop, Hadoop, Apache Pulsar, Pulsar, Apache Spark, Spark, Apache TinkerPop, TinkerPop, Apache Kafka and Kafka are either registered trademarks or trademarks of the Apache Software Foundation or its subsidiaries in Canada, the United States and/or other countries. Kubernetes is the registered trademark of the Linux Foundation.

General Inquiries: +1 (650) 389-6000,