Database Reference
In-Depth Information
Chapter 6. Implementing Security Using
Kerberos
So far, we have covered all that is required to set up an Apache Hadoop cluster running
CDH5 and managed by Cloudera Manager. With the cluster now ready to serve large
volumes of data to users, the administrator needs to take into account the different users
who will be accessing the system. In a production environment, organizations are very
stringent in terms of security and expect their data and services to be secure. The adminis-
trator needs to have the tools to secure the Apache Hadoop cluster in their armor, and allow
only authenticated users to access the cluster. Apart from authorization, the administrator
has to be careful about what services in the cluster a user can access. Using Kerberos , the
administrator can set up a highly secure cluster with robust authentication for users and ser-
vices.
In this chapter, we will cover the following topics:
• Understanding authentication and authorization
• Introduction to Kerberos
• Understanding the Kerberos architecture
• Installing Kerberos
• Configuring Kerberos for Apache Hadoop
• Configuring Service Level Authorization in Apache Hadoop
Search WWH ::




Custom Search