Home » Authentication

Checklist for a Secure Hadoop Cluster

There are some standard best practices for securing a Hadoop cluster. When securing a cluster, we are trying to address the concerns specified in Primer on security in a Data System. Let us quickly review what are some of…

Read More »

Authentication Methods across Hadoop projects

Let us review the authentication methods used across Hadoop related projects. You can see that most products support Kerberos. Majority supports  LDAP as well.  Most products enable you to plugin your own custom authentication. Here is the catalog…

Read More »