Cloudera Security
This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. It provides conceptual overviews and how-to information about setting up various Hadoop components for optimal security, including how to setup a gateway to restrict access. This guide assumes that you have basic knowledge of Linux and systems administration practices, in general.
Continue reading:
Page generated August 14, 2017.
<< Disabling Metrics for Specific Roles | ©2016 Cloudera, Inc. All rights reserved | Cloudera Security Overview >> |
Terms and Conditions Privacy Policy |