O'Reilly logo

Securing Hadoop by Sudheesh Narayanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hadoop Kerberos security implementation

Enforcing security within a distributed system such as Hadoop is complex. The detailed requirements for securing Hadoop were identified by Owen O'Malley and others as part of the Hadoop security design. The detailed document is attached with the ticket HADOOP-4487 at https://issues.apache.org/jira/browse/HADOOP-4487. A summary of these requirements is explained in this section.

User-level access controls

A brief on the user-level access controls is:

  • Users of Hadoop should only be able to access data that is authorized for them
  • Only authenticated users should be able to submit jobs to the Hadoop cluster
  • Users should be able to view, modify, and kill only their own jobs
  • Only authenticated services should be able ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required