Hadoop Kerberos security implementation
Enforcing security within a distributed system such as Hadoop is complex. The detailed requirements for securing Hadoop were identified by Owen O'Malley and others as part of the Hadoop security design. The detailed document is attached with the ticket HADOOP-4487 at https://issues.apache.org/jira/browse/HADOOP-4487. A summary of these requirements is explained in this section.
User-level access controls
A brief on the user-level access controls is:
- Users of Hadoop should only be able to access data that is authorized for them
- Only authenticated users should be able to submit jobs to the Hadoop cluster
- Users should be able to view, modify, and kill only their own jobs
- Only authenticated services should be able ...
Get Securing Hadoop now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.