Depending on your Hadoop security environment, the following sections describe implications for the platform and provide links to appropriate documentation.
Depending on use of Single Sign On, Alteryx users access the application using the following credentials.
Security Features | Implications |
---|
Single Sign On (SSO) | Users access application using the LDAP/AD principal associated with their account. For more information, see Configure SSO for AD-LDAP. |
All other security scenarios | Users access application using their Alteryx userId. |
The following security scenarios apply to accessing Hadoop-based data storage.
Depending on the following security features implemented in your Hadoop environment, your interactions with HDFS may have different implications.
Security Features | Implications |
---|
No Kerberos authentication | - All Alteryx users use the
[hadoop.user (default=trifacta )] Hadoop user to access HDFS. - No security is applied.
|
- Kerberos authentication
- No secure impersonation
| - All Alteryx users authenticate and then use delegation token for all requests to HDFS.
- If you receive an error when attempting to contact HDFS, your delegation token may have failed due to configuration error. Please contact your Alteryx administrator.
- All Alteryx users use the
[hadoop.user] Hadoop user to access HDFS.
|
- Kerberos authentication
- Secure impersonation
| - All Alteryx users authenticate with the
[hadoop.user] user keytab. The [hadoop.user] user retrieves a delegation token on behalf of the user's Hadoop principal.- If you receive an error when attempting to contact HDFS, your delegation token may have failed due to a configuration error. Please contact your Alteryx administrator.
- Alteryx users securely impersonate using their assigned Hadoop principal on HDFS.
|
For more technical information:
Depending on the following security features implemented in your Hadoop environment, your interactions with Hive may have different implications.
Security Features | Implications |
---|
No additional security features | - All Alteryx users use the
[hadoop.user] Hadoop user to access Hive. - No security is applied.
|
- Kerberos authentication
- No secure impersonation
| - Alteryx users authenticate with the
[hadoop.user] user keytab for all requests to Hive.- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your Alteryx administrator.
|
- Kerberos authentication
- Secure impersonation
| - Alteryx users authenticate with the
[hadoop.user] user keytab and then send proxying requests on behalf of the user's Hadoop principal.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your Alteryx administrator.
- Hive is responsible for respecting proxy permissions, with the
hive user itself proxying as [hadoop.user] proxying as the user's Hadoop principal.
|
- Kerberos authentication
- Secure authentication
- Sentry role-based access (Cloudera only)
| - Alteryx users authenticate with the
[hadoop.user] user keytab and then send proxying requests on behalf of the user's Hadoop principal.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your Alteryx administrator.
- Hive executes access to the physical data file on HDFS as the Unix or LDAP user
hive , which should be part of the group [hadoop.group (default=trifactausers )] .
|
- Sentry role-based access (Cloudera only)
| - Hive authorizes access with a Sentry lookaside. The
[hadoop.user] user as well as the user's Hadoop principal should be configured with appropriate privileges and roles in Sentry.
|
- Kerberos authentication
- No secure authentication
- Sentry role-based access (Cloudera only)
| - Alteryx users authenticate with the
[hadoop.user] user keytab.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your Alteryx administrator.
- Hive executes access to the physical data file on HDFS as the Unix or LDAP user
hive , which should be part of the group [hadoop.group (default=trifactausers )] .
|
See Also for Configure Hadoop Authentication:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
-
Page:
This page has no comments.