diff --git a/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl b/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl
index 267c75676..f0b72a3ec 100644
--- a/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl
+++ b/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl
@@ -42,12 +42,12 @@ fields(gssapi) ->
{principal,
?HOCON(binary(), #{
required => true,
- desc => ?DESC(emqx_bridge_kafka, auth_kerberos_principal)
+ desc => ?DESC(principal)
})},
{keytab_file,
?HOCON(binary(), #{
required => true,
- desc => ?DESC(emqx_bridge_kafka, auth_kerberos_keytab_file)
+ desc => ?DESC(keytab_file)
})}
].
diff --git a/rel/i18n/emqx_authn_gssapi_schema.hocon b/rel/i18n/emqx_authn_gssapi_schema.hocon
new file mode 100644
index 000000000..02c3cc847
--- /dev/null
+++ b/rel/i18n/emqx_authn_gssapi_schema.hocon
@@ -0,0 +1,18 @@
+emqx_authn_gssapi_schema {
+
+principal {
+ label: "Kerberos Principal"
+ desc: """~
+ SASL GSSAPI authentication Kerberos principal.
+ For example mqtt/node1.example.com@MY_REALM.EXAMPLE.COM
.
+ NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.~"""
+}
+
+keytab_file {
+ label: "keytab file"
+ desc: """~
+ SASL GSSAPI authentication Kerberos keytab file path.
+ NOTE: This file has to be placed in EMQX nodes.~"""
+}
+
+}
diff --git a/rel/i18n/emqx_bridge_kafka.hocon b/rel/i18n/emqx_bridge_kafka.hocon
index f63e6f3eb..6f02b64b7 100644
--- a/rel/i18n/emqx_bridge_kafka.hocon
+++ b/rel/i18n/emqx_bridge_kafka.hocon
@@ -147,7 +147,7 @@ consumer_mqtt_opts.label:
"""MQTT publish"""
auth_kerberos_principal.desc:
-"""SASL GSSAPI authentication Kerberos principal. For example client_name@MY.KERBEROS.REALM.MYDOMAIN.COM
, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes."""
+"""SASL GSSAPI authentication Kerberos principal. For example kafka/node1.example.com@EXAMPLE.COM
, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes."""
auth_kerberos_principal.label:
"""Kerberos Principal"""