April 2018
Beginner to intermediate
282 pages
9h 53m
English
As we know we have different sets of teams working on the Data Lake and Hadoop cluster, therefore, using IAM roles we need to segregate the users and their privileges. We can control this by using right policies in Identity and Access Management.