
Depending on your Hadoop security environment, the following sections describe implications for the platform and provide links to appropriate documentation.
End-User Authentication
Depending on use of Single Sign On,
access the application using the following credentials.
Security Features | Implications |
---|
Single Sign On (SSO) | Users access application using the LDAP/AD principal associated with their account. For more information, see Configure SSO for AD-LDAP. |
All other security scenarios | Users access application using their . |
End-User Authorization
The following security scenarios apply to accessing Hadoop-based data storage.
Security Scenarios for HDFS Access
Depending on the following security features implemented in your Hadoop environment, your interactions with HDFS may have different implications.
Security Features | Implications |
---|
No Kerberos authentication | - All
use the Hadoop user to access HDFS. - No security is applied.
|
- Kerberos authentication
- No secure impersonation
| - All
authenticate and then use delegation token for all requests to HDFS.- If you receive an error when attempting to contact HDFS, your delegation token may have failed due to configuration error. Please contact your
.
- All
use the Hadoop user to access HDFS.
|
- Kerberos authentication
- Secure impersonation
| - All
authenticate with the user keytab. The user retrieves a delegation token on behalf of the user's Hadoop principal.- If you receive an error when attempting to contact HDFS, your delegation token may have failed due to a configuration error. Please contact your
.
securely impersonate using their assigned Hadoop principal on HDFS.
|
For more technical information:
Security Scenarios for Hive Access
Depending on the following security features implemented in your Hadoop environment, your interactions with Hive may have different implications.
Security Features | Implications |
---|
No additional security features | - All
use the Hadoop user to access Hive. - No security is applied.
|
- Kerberos authentication
- No secure impersonation
| authenticate with the user keytab for all requests to Hive.- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your
.
|
- Kerberos authentication
- Secure impersonation
| authenticate with the user keytab and then send proxying requests on behalf of the user's Hadoop principal.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your
.
- Hive is responsible for respecting proxy permissions, with the
hive user itself proxying as proxying as the user's Hadoop principal.
|
- Kerberos authentication
- Secure authentication
- Sentry role-based access (Cloudera only)
- Ranger role-based access (Hortonworks only)
| authenticate with the user keytab and then send proxying requests on behalf of the user's Hadoop principal.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your
.
- Hive executes access to the physical data file on HDFS as the Unix or LDAP user
hive , which should be part of the group .
|
- Sentry role-based access (Cloudera only)
| - Hive authorizes access with a Sentry lookaside. The
user as well as the user's Hadoop principal should be configured with appropriate privileges and roles in Sentry.
|
- Kerberos authentication
- No secure authentication
- Sentry role-based access (Cloudera only)
- Ranger role-based access (Hortonworks only)
| authenticate with the user keytab.
- If you receive an error when attempting to contact Hive, authentication likely failed due to a configuration error. Please contact your
.
- Hive executes access to the physical data file on HDFS as the Unix or LDAP user
hive , which should be part of the group .
|
For more technical information: