Hi,
I am bit confused on Security part of Hadoop. Cluster is behind the firewall. I 
have read that Hadoop can be configured with LDAP also. 
I want to know which is better : configure Hadoop security with LDAP or 
Kerberos as both provide authentication.

Please provide me more details on this as I am newbee in this part.

Thanks


-----Original Message-----
From: alo alt [mailto:wget.n...@googlemail.com] 
Sent: Monday, February 06, 2012 3:56 PM
To: hdfs-user@hadoop.apache.org
Subject: Re: Security in Hadoop-1.0.0

Kerberos tokens and lifetime:
http://hortonworks.com/the-role-of-delegation-tokens-in-apache-hadoop-security/

Security in CDH3 (the same as hadoop)
https://ccp.cloudera.com/display/CDHDOC/CDH3+Security+Guide

best,
 Alex 

--
Alexander Lorenz
http://mapredit.blogspot.com

On Feb 6, 2012, at 11:19 AM, Stuti Awasthi wrote:

> Hi all,
> I started looking into configure security in Hadoop-1.0.0 but do not find 
> concrete documentation on which kind of security is provided in this release 
> and how to configure them.
> Currently I am following 
> "http://hadoop.apache.org/common/docs/r1.0.0/"; documentation
> 
> As per knowledge, Proxy authentication and Kerberos security is provided in 
> this release of Hadoop. Please point me to some good documentation or give me 
> some pointers from where I can start this work.
> 
> Thanks
> Stuti Awasthi
> 
> 
> 
> ::DISCLAIMER::
> ----------------------------------------------------------------------
> -------------------------------------------------
> 
> The contents of this e-mail and any attachment(s) are confidential and 
> intended for the named recipient(s) only.
> It shall not attach any liability on the originator or HCL or its 
> affiliates. Any views or opinions presented in this email are solely those of 
> the author and may not necessarily reflect the opinions of HCL or its 
> affiliates.
> Any form of reproduction, dissemination, copying, disclosure, 
> modification, distribution and / or publication of this message 
> without the prior written consent of the author of this e-mail is 
> strictly prohibited. If you have received this email in error please delete 
> it and notify the sender immediately. Before opening any mail and attachments 
> please check them for viruses and defect.
> 
> ----------------------------------------------------------------------
> -------------------------------------------------

Reply via email to