As more corporations turn to hadoop to store and process their most valuable data the risk of a potential breach of those systems increases exponentially this practical book not only shows hadoop administrators and security architects how to protect hadoop data from unauthorized access it also . Discussion on an open roadmap for security with apache hadoop. In his new article kevin t smith focuses on the importance of big data security and he discusses the evolution of hadoops security model he addresses the current trends in hadoop security implementations and provides an overview of the details of project rhino aimed to improve the security capabilities of hadoop and the hadoop ecosystem. This document describes how to configure authentication for hadoop in secure mode by default hadoop runs in non as a value of hadoopsecuritygroup . The security features in cdh 5 enable hadoop to prevent malicious user impersonation the hadoop daemons leverage kerberos to perform user authentication on all remote procedure calls rpcs group resolution is performed on the hadoop master nodes namenode jobtracker and resourcemanager to
How it works:
1. Register a Free 1 month Trial Account.
2. Download as many books as you like ( Personal use )
3. No Commitment. Cancel anytime.
4. Join Over 100.000 Happy Readers.
5. That's it. What you waiting for? Sign Up and Get Your Books.