Home » Authorization

Checklist for a Secure Hadoop Cluster

There are some standard best practices for securing a Hadoop cluster. When securing a cluster, we are trying to address the concerns specified in Primer on security in a Data System. Let us quickly review what are some of…

Read More »


Impersonation is the process by which a user acts as another user (just like the name implies). Its same as the sudo privileges in Unix. It makes perfect sense in Hadoop when we consider Hadoop as an Operating system for…

Read More »