<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Kerberos authentication</title>
    <link>/en/security-and-authentication/client-authentication/kerberos-authentication/</link>
    <description>Recent content in Kerberos authentication on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/security-and-authentication/client-authentication/kerberos-authentication/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Security-and-Authentication: Configure OpenText&amp;trade; Analytics Database for Kerberos authentication</title>
      <link>/en/security-and-authentication/client-authentication/kerberos-authentication/configure-kerberos-authentication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/kerberos-authentication/configure-kerberos-authentication/</guid>
      <description>
        
        
        &lt;p&gt;Kerberos provides a strong cryptographic authentication against the devices which lets the client &amp;amp; servers to communicate in a more secured manner. It addresses network security problems.&lt;/p&gt;
&lt;p&gt;Your system must have one or more Kerberos Key Distribution Centers (KDC) installed and configured. The KDCs must be accessible from every node in your OpenText™ Analytics Database cluster.&lt;/p&gt;
&lt;p&gt;The KDC must support Kerberos 5 using GSS-API. For details, see the &lt;a href=&#34;http://web.mit.edu/kerberos/dist/&#34;&gt;MIT Kerberos Distribution Page.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;in-this-section&#34;&gt;In this section&lt;/h2&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Configure clients for Kerberos authentication</title>
      <link>/en/security-and-authentication/client-authentication/kerberos-authentication/configure-clients-kerberos-authentication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/kerberos-authentication/configure-clients-kerberos-authentication/</guid>
      <description>
        
        
        &lt;p&gt;Each supported platform has a different security framework. Thus, the steps required to configure and authenticate against Kerberos differ among clients.&lt;/p&gt;
&lt;p&gt;On the server side, you construct the OpenText™ Analytics Database Kerberos service name principal using this format:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Kerberos_Service_Name/Kerberos_Host_Name@Kerberos_Realm
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;For each client, the GSS libraries require the following format for the database service principal:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Kerberos_Service_Name@Kerberos_Host_Name
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;You can omit the realm portion of the principal because GSS libraries use the realm name of the configured default (&lt;code&gt;Kerberos_Realm&lt;/code&gt;) realm.&lt;/p&gt;
&lt;p&gt;For information about client connection strings, see the following topics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/connecting-to/client-libraries/client-drivers/install-config/odbc/creating-an-odbc-data-source-name-dsn/odbc-dsn-connection-properties/#&#34;&gt;ODBC DSN connection properties&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/connecting-to/client-libraries/accessing/java/creating-and-configuring-connection/jdbc-connection-properties/#&#34;&gt;JDBC connection properties&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/connecting-to/client-libraries/accessing/c/connecting-to-db/ado-net-connection-properties/#&#34;&gt;ADO.NET connection properties&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;(vsql) &lt;a href=&#34;../../../../en/connecting-to/using-vsql/connecting-from-command-line/command-line-options/#&#34;&gt;Command-line options&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

A few scenarios exist in which the database server principal name might not match the host name in the connection string. See &lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/troubleshooting-kerberos-authentication/&#34;&gt;Troubleshooting Kerberos Authentication&lt;/a&gt; for more information.

&lt;/div&gt;
&lt;h2 id=&#34;in-this-section&#34;&gt;In this section&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/configure-clients-kerberos-authentication/configure-odbc-and-vsql-clients-on-non-windows-platforms/#&#34;&gt;Configure ODBC and vsql clients on non-windows platforms&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/configure-clients-kerberos-authentication/configure-ado-net-odbc-and-vsql-clients-on-windows/&#34;&gt;Configure ODBC and vsql Clients on Windows and ADO.NET&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/configure-clients-kerberos-authentication/configure-jdbc-clients-on-all-platforms/&#34;&gt;Configure JDBC Clients on all Platforms&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Troubleshooting Kerberos authentication</title>
      <link>/en/security-and-authentication/client-authentication/kerberos-authentication/troubleshooting-kerberos-authentication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/kerberos-authentication/troubleshooting-kerberos-authentication/</guid>
      <description>
        
        
        &lt;p&gt;These tips can help you avoid issues related to Kerberos authentication with OpenText™ Analytics Database and to troubleshoot any problems that occur.&lt;/p&gt;
&lt;h2 id=&#34;jdbc-client-authentication-fails&#34;&gt;JDBC client authentication fails&lt;/h2&gt;
&lt;p&gt;If Kerberos authentication fails on a JDBC client, check the JAAS login configuration file for syntax issues. If syntax is incorrect, authentication fails.&lt;/p&gt;
&lt;h2 id=&#34;working-domain-name-service-dns-not-configured&#34;&gt;Working domain name service (DNS) not configured&lt;/h2&gt;
&lt;p&gt;Verify that the DNS entries and the system host file (/etc/hosts or /etc/hostnames) on the network are all properly configured for your environment. If you are using a fully qualified domain name, ensure that is properly configured as well. Refer to the Kerberos documentation for your platform for details.&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;System&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;system-clocks-out-of-sync&#34;&gt;System clocks out of sync&lt;/h2&gt;
&lt;p&gt;System clocks in your network must remain in sync for Kerberos authentication to work properly. If you access data in HDFS, then the database nodes must also be in sync with Hadoop.&lt;/p&gt;
&lt;h3 id=&#34;all-systems-except-red-hat-7centos-7&#34;&gt;All systems except red hat 7/CentOS 7&lt;/h3&gt;
&lt;p&gt;To keep system clocks in sync:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Install NTP on the Kerberos server (KDC).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install NTP on each server in your network.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Synchronize system clocks on all machines that participate in the Kerberos realm within a few minutes of the KDC and each other&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Clock skew can be a problem on Linux virtual machines that need to sync with the Windows Time Service. Use the following stepsto keep time in sync:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Using any text editor, open &lt;code&gt;/etc/ntp.conf&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under the &lt;code&gt;Undisciplined Local Clock&lt;/code&gt; section, add the IP address for the database server. Then, remove existing server entries.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Log in to the server as root, and set up a cron job to sync time with the added IP address every half hour, or as often as needed. For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# 0 */2 * * * /etc/init.d/ntpd restart
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Alternatively, run the following command to force clock sync immediately:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ sudo /etc/init.d/ntpd restart
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more information, see &lt;a href=&#34;../../../../en/setup/set-up-on-premises/before-you-install/manually-configured-os-settings/enabling-network-time-protocol-ntp/#&#34;&gt;Enabling network time protocol (NTP)&lt;/a&gt; and the &lt;a href=&#34;http://www.ntp.org/&#34;&gt;Network Time Protocol website&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;red-hat-7centos-7-systems&#34;&gt;Red hat 7/CentOS 7 systems&lt;/h3&gt;
&lt;p&gt;In Red Hat 7/CentOS 7, &lt;code&gt;ntpd&lt;/code&gt; is deprecated in favor of &lt;code&gt;chrony&lt;/code&gt;. To keep system clocks in your network in sync for Kerberos authentication to work properly, do the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Install &lt;code&gt;chrony&lt;/code&gt; on the Kerberos server (KDC).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install &lt;code&gt;chrony&lt;/code&gt; on each server in your network.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Synchronize system clocks on all machines that participate in the Kerberos realm within a few minutes of the KDC and each other.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;clock-skew-on-linux-virtual-machines&#34;&gt;Clock skew on Linux virtual machines&lt;/h3&gt;
&lt;p&gt;Clock skew can be problematic on Linux virtual machines that need to sync with the Windows Time Service. Try the following to keep time in sync:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Using any text editor, open &lt;code&gt;/etc/chrony.conf&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under the &lt;code&gt;Undisciplined Local Clock&lt;/code&gt; section, add the IP address for the database server. Then, remove existing server entries.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Log in to the server as root, and set up a cron job to sync time with the added IP address every half hour, or as often as needed. For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# 0 */2 * * * systemctl start chronyd
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Alternatively, run the following command to force clock sync immediately:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ sudo systemctl start chronyd
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more information, see the &lt;a href=&#34;https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/System_Administrators_Guide/sect-Understanding_chrony_and-its_configuration.html&#34;&gt;Red Hat chrony guide&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;kerberos-ticket-is-valid-but-hadoop-access-fails&#34;&gt;Kerberos ticket is valid, but Hadoop access fails&lt;/h2&gt;
&lt;p&gt;The database uses Kerberos tickets to obtain Hadoop tokens. It then uses the Hadoop tokens to access the Hadoop data. Hadoop tokens expire after a period of time, so the database periodically refreshes them. However, if your Hadoop cluster is set to expire tokens frequently, it is possible that tokens might not be refreshed in time. If the token expires, you cannot access data.&lt;/p&gt;
&lt;p&gt;Setting the HadoopFSTokenRefreshFrequency configuration parameter allows you to specify how often the database should refresh the token. Specify this value, in seconds, to be smaller than the expiration period set for Hadoop. For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; ALTER DATABASE exampledb SET HadoopFSTokenRefreshFrequency = &amp;#39;86400&amp;#39;;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;For another cause of Hadoop access failure, see &lt;a href=&#34;#System&#34;&gt;System Clocks Out of Sync&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;encryption-algorithm-choices&#34;&gt;Encryption algorithm choices&lt;/h2&gt;
&lt;p&gt;Kerberos is based on symmetric encryption. Be sure that all Kerberos parties used in the Kerberos realm agree on the encryption algorithm to use. If they do not agree, authentication fails. You can review the exceptions in the &lt;code&gt;vertica.log&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;On a Windows client, be sure the encryption types match the types set on Active Directory. See &lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/configure-kerberos-authentication/#&#34;&gt;Configure OpenText&amp;amp;trade; Analytics Database for Kerberos authentication&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Be aware that Kerberos is used only for securing the login process. After the login process completes, by default, information travels between client and server without encryption. If you want to encrypt traffic, use SSL. For details, see &lt;a href=&#34;../../../../en/security-and-authentication/tls-protocol/&#34;&gt;Implementing SSL&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;kerberos-passwords-not-recognized&#34;&gt;Kerberos passwords not recognized&lt;/h2&gt;
&lt;p&gt;If you change your Kerberos password, you must re-create all of your keytab files.&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;UsingODBC&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;using-the-odbc-data-source-configuration-utility&#34;&gt;Using the ODBC data source configuration utility&lt;/h2&gt;
&lt;p&gt;On Windows vsql clients, you may choose to use the ODBC Data Source Configuration utility and supply a client Data Source. If so, be sure you enter a Kerberos host name in the Client Settings tab to avoid client connection failures with the database server.&lt;/p&gt;
&lt;h2 id=&#34;authentication-failure-in-backup-restore-or-admin-tools&#34;&gt;Authentication failure in backup, restore, or admin tools&lt;/h2&gt;
&lt;p&gt;This problem can arise in configurations where each database node uses its own Kerberos principal. (This configuration is recommended.) When using vbr or admintools you might see an error such as the following:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ vsql: GSSAPI continuation error: Miscellaenous failure
GSSAPI continuation error: Server not found in Kerberos database
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Backup/restore and the admin tools use the value of KerberosHostname, if it is set, in the Kerberos principal used to authenticate. The same value is used on all nodes. If you have defined one Kerberos principal per node, as recommended, this value does not match. To correct this, unset the KerberosHostname parameter:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; ALTER DATABASE DEFAULT CLEAR KerberosHostname;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;servers-principal-name-does-not-match-host-name&#34;&gt;Server&#39;s principal name does not match host name&lt;/h2&gt;
&lt;p&gt;This problem can arise in configurations where a single Kerberos principal is used for all nodes. OpenText recommends against using a single Kerberos principal for all nodes. Instead, use one principal per node and do not set the KerberosHostname parameter.&lt;/p&gt;
&lt;p&gt;In some cases during client connection, the database server&#39;s principal name might not match the host name in the connection string. (See also &lt;a href=&#34;#UsingODBC&#34;&gt;Using the ODBC Data Source Configuration Utility&lt;/a&gt; in this topic.)&lt;/p&gt;
&lt;p&gt;On Windows vsql clients, you may choose to use the ODBC Data Source Configuration utility and supply a client Data Source. If so, be sure you enter a Kerberos host name in the Client Settings tab to avoid client connection failures with the database server.&lt;/p&gt;
&lt;p&gt;On ODBC, JDBC, and ADO.NET clients, set the host name portion of the server&#39;s principal using the &lt;code&gt;KerberosHostName&lt;/code&gt; connection string.

&lt;div class=&#34;alert admonition tip&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Tip&lt;/h4&gt;

&lt;p&gt;On vsql clients, you set the host name portion of the server&#39;s principal name using the &lt;code&gt;-K KRB HOST&lt;/code&gt; command-line option. The default value is specified by the &lt;code&gt;-h&lt;/code&gt; switch, which is the host name of the machine on which the database server is running. &lt;code&gt;-K&lt;/code&gt; is equivalent to the drivers&#39; &lt;code&gt;KerberosHostName&lt;/code&gt; connection string value.&lt;/p&gt;
&lt;p&gt;For details, see &lt;a href=&#34;../../../../en/connecting-to/using-vsql/connecting-from-command-line/command-line-options/&#34;&gt;Command Line Options&lt;/a&gt;.&lt;/p&gt;


&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;principalhost-mismatch-issues-and-resolutions&#34;&gt;Principal/host mismatch issues and resolutions&lt;/h2&gt;
&lt;p&gt;The following issues can occur if the principal and host are mismatched.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The &lt;code&gt;KerberosHostName&lt;/code&gt; configuration parameter has been overridden&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For example, consider the following connection string:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;jdbc:vertica://v_vmart_node0001.example.com/vmart?user=kuser
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Because the this connection string includes no explicit &lt;code&gt;KerberosHostName&lt;/code&gt; parameter, the driver defaults to the host in the URL &lt;code&gt;(v_vmart_node0001.example.com&lt;/code&gt;). If you overwrite the server-side &lt;code&gt;KerberosHostName&lt;/code&gt; parameter as “&lt;code&gt;abc&lt;/code&gt;”, the client generates an incorrect principal.&lt;/p&gt;
&lt;p&gt;To resolve this issue, explicitly set the client’s &lt;code&gt;KerberosHostName&lt;/code&gt; to the connection string, as in this example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;jdbc:vertica://v_vmart_node0001.example.com/vmart?user=kuser&amp;amp;kerberoshostname=abc
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;Connection load balancing is enabled...&lt;/strong&gt; but the node against which the client authenticates might not be the node in the connection string.&lt;/p&gt;
&lt;p&gt;In this situation, consider changing all nodes to use the same &lt;code&gt;KerberosHostName&lt;/code&gt; setting. When you use the default to the host that was originally specified in the connection string, load balancing cannot interfere with Kerberos authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A DNS name does not match the Kerberos host name&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For example, imagine a cluster of six servers, where you want &lt;code&gt;hr-servers&lt;/code&gt; and &lt;code&gt;finance-servers&lt;/code&gt; to connect to different nodes on the database cluster. Kerberos authentication, however, occurs on a single (the same) KDC. In the following example, the Kerberos service host name of the servers is &lt;code&gt;server.example.com&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Suppose you have the following list of example servers:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;server1.example.com 192.16.10.11
server2.example.com 192.16.10.12
server3.example.com 192.16.10.13
server4.example.com 192.16.10.14
server5.example.com 192.16.10.15
server6.example.com 192.16.10.16
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Now, assume you have the following DNS entries:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;finance-servers.example.com 192.168.10.11, 192.168.10.12, 192.168.10.13
hr-servers.example.com 192.168.10.14, 192.168.10.15, 192.168.10.16
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;When you connect to &lt;code&gt;finance-servers.example.com&lt;/code&gt;, specify:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Kerberos &lt;code&gt;-h&lt;/code&gt; host name option as &lt;code&gt;server.example.com&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-K&lt;/code&gt; host option for &lt;code&gt;hr-servers.example.com&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ vsql -h finance-servers.example.com -K server.example.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;No DNS is set up on the client machine...&lt;/strong&gt; so you must connect by IP only&lt;/p&gt;
&lt;p&gt;To resolve this issue, specify:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Kerberos &lt;code&gt;-h&lt;/code&gt; host name option for the IP address&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-K&lt;/code&gt; host option for &lt;code&gt;server.example.com&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ vsql -h 192.168.1.12 -K server.example.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;There is a load balancer involved (Virtual IP)...&lt;/strong&gt; but there is no DNS name for the VIP&lt;/p&gt;
&lt;p&gt;Specify:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Kerberos &lt;code&gt;-h&lt;/code&gt; host name option for the Virtual IP address&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-K&lt;/code&gt; host option for &lt;code&gt;server.example.com&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ vsql -h &amp;lt;virtual IP&amp;gt; -K server.example.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;You connect to the OpenText™ Analytics Database using an IP address...&lt;/strong&gt; but there is no host name to construct the Kerberos principal name.&lt;/p&gt;
&lt;p&gt;Provide the instance or host name for the database as described in &lt;a href=&#34;../../../../en/security-and-authentication/client-authentication/kerberos-authentication/configure-kerberos-authentication/inform-about-kerberos-principal/#&#34;&gt;Inform OpenText&amp;amp;trade; Analytics Database about the Kerberos principal&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The server-side &lt;code&gt;KerberosHostName&lt;/code&gt; configuration parameter is set to a name other than the database node&#39;s host name...&lt;/strong&gt; but the client cannot determine the host name based on the host name in the connection string alone.&lt;/p&gt;
&lt;p&gt;Reset KerberosHostName to match the name of the database node&#39;s host name. For more information, see the following topics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/connecting-to/client-libraries/client-drivers/install-config/odbc/creating-an-odbc-data-source-name-dsn/odbc-dsn-connection-properties/&#34;&gt;ODBC DSN Parameters&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/connecting-to/client-libraries/accessing/java/creating-and-configuring-connection/jdbc-connection-properties/&#34;&gt;JDBC Connection Properties&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/connecting-to/client-libraries/accessing/c/connecting-to-db/ado-net-connection-properties/&#34;&gt;ADO.NET Connection Properties&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
  </channel>
</rss>
