Github user HeartSaVioR commented on a diff in the pull request:
    --- Diff: docs/ ---
    @@ -17,6 +17,9 @@ Authentication and Authorization. But to do so usually 
     configuring your Operating System to restrict the operations that can be 
     This is generally a good idea even if you plan on running your cluster 
with Auth.
    +Meaning to say, Storm's OS level security is based on running Storm 
processes with proper OS account,
    --- End diff --
    I think that's clearer. Thanks for suggestion.


Reply via email to