diff --git a/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl b/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl index 267c75676..f0b72a3ec 100644 --- a/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl +++ b/apps/emqx_auth_gssapi/src/emqx_authn_gssapi_schema.erl @@ -42,12 +42,12 @@ fields(gssapi) -> {principal, ?HOCON(binary(), #{ required => true, - desc => ?DESC(emqx_bridge_kafka, auth_kerberos_principal) + desc => ?DESC(principal) })}, {keytab_file, ?HOCON(binary(), #{ required => true, - desc => ?DESC(emqx_bridge_kafka, auth_kerberos_keytab_file) + desc => ?DESC(keytab_file) })} ]. diff --git a/rel/i18n/emqx_authn_gssapi_schema.hocon b/rel/i18n/emqx_authn_gssapi_schema.hocon new file mode 100644 index 000000000..02c3cc847 --- /dev/null +++ b/rel/i18n/emqx_authn_gssapi_schema.hocon @@ -0,0 +1,18 @@ +emqx_authn_gssapi_schema { + +principal { + label: "Kerberos Principal" + desc: """~ + SASL GSSAPI authentication Kerberos principal. + For example mqtt/node1.example.com@MY_REALM.EXAMPLE.COM. + NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.~""" +} + +keytab_file { + label: "keytab file" + desc: """~ + SASL GSSAPI authentication Kerberos keytab file path. + NOTE: This file has to be placed in EMQX nodes.~""" +} + +} diff --git a/rel/i18n/emqx_bridge_kafka.hocon b/rel/i18n/emqx_bridge_kafka.hocon index f63e6f3eb..6f02b64b7 100644 --- a/rel/i18n/emqx_bridge_kafka.hocon +++ b/rel/i18n/emqx_bridge_kafka.hocon @@ -147,7 +147,7 @@ consumer_mqtt_opts.label: """MQTT publish""" auth_kerberos_principal.desc: -"""SASL GSSAPI authentication Kerberos principal. For example client_name@MY.KERBEROS.REALM.MYDOMAIN.COM, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.""" +"""SASL GSSAPI authentication Kerberos principal. For example kafka/node1.example.com@EXAMPLE.COM, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.""" auth_kerberos_principal.label: """Kerberos Principal"""