Druid currently doesn’t support ldap authentication.You can track the issue here.
To get started with the extension , add the following lines to your common.runtime.properties file.
#The below lines create two default users admin and druid_system with the respective passwords.
Escalator - This defines which user the internal nodes in a cluster should use to communicate with each other.
And restart all your nodes.Now when you try to access the coordinator UI or the overlord UI you will be prompted for username and password.
When you enter your username and password(in this case ,user is “admin” and password is “password1” ) ,
In the backend the followling things take place
First step is to verify whether you are valid user and have entered the correct credentials.
If yes, the request is forwarded to Authorizer which check whether you have permission to view the information.
Now let’s say you want to create a user who has access to view only a specific datasource (let’s say “wikipedia”).
#To create a user named “wiki” , send a post request to the below endpoint (curl -X POST link)
#To set the password of the user as wiki@123
#Above requests create user at authenticator.
#To create user at authorizer, send post request to
#now set permissions for the user
#the body will contain the following info
#The wiki user will be able to see only the information about wikipedia datasource on coordinator UI.
#And also view ingestion tasks for the wikipedia datasource on the overlord UI.
There are other resource types which can be used for providing certain endpoints of coordinator and middle manger.
hope this helps.