CHAPTER 4

image

Open Source Authentication in Hadoop

In previous chapters, you learned what a secure system is and what Hadoop security is missing in comparison to what the industry considers a secure system—Microsoft SQL Server (a relational database system). This chapter will focus on implementing some of the features of a secure system to secure your Hadoop cluster from all the Big Bad Wolves out there. Fine-tuning security is more art than a science. There are no rules as to what is “just right” for an environment, but you can rely on some basic conventions to help you get closer—if not “just right.” For example, because Hadoop is a distributed ...

Get Practical Hadoop Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.