Database Reference
In-Depth Information
Summary
In this chapter, we started by understanding authentication and authorization. We also
learned the architecture of the Kerberos authentication system, which we installed and con-
figured for Apache Hadoop. We covered the basics of authorization in Apache Hadoop by
going through a few of the properties in the hadoop_policy.xml file.
In the next chapter, we will cover the tools and techniques to perform all the administrative
activities needed to manage a full-fledged Apache Hadoop production cluster.
Search WWH ::




Custom Search