May 2017
Beginner to intermediate
596 pages
15h 2m
English
One of the key design thoughts which Sqoop 2 considered when it was being designed and developed is security. For modern day enterprises, utmost care is given to data security, and Sqoop 2 does aid in having a granular and fine grained access control.
The following table summarizes this very important aspect between the two Sqoop versions.
| Sqoop 1 | Sqoop 2 |
| No role-based access control | Role-based access control possible because of the single Sqoop server component. |
| Only Hadoop security available | Hadoop security along with role-based security available. |
| Limited security support (username/password) when integrating with external systems | External system security using role-based access control. |
| Client requires direct access ... |