官术网_书友最值得收藏!

User authentication

Hadoop can use the native user-authentication methods of the server. For example, in Linux-based machines, users can be authenticated based on the IDs defined in the system's /etc/passwd files. In other words, Hadoop inherits the user authentication set up on the server side.

User authentication via Kerberos, a cross-platform authentication protocol, is also commonly used in Hadoop clusters. Kerberos works based on a concept of tickets that grant privileges to users on a temporary as-needed basis. Tickets can be invalidated using Kerberos commands, thus restricting the users' rights to access resources on the cluster as needed.

Note that even if the user is permitted to access data (user authentication), he or she can still be limited in what data can be accessed due to another feature known as authorization. The term implies that even if the user can authenticate and log in to the system, the user may be restricted to only the data the user is authorized to access. This level of authorization is generally performed using native HDFS commands to change directory and file ownerships to the named users.

主站蜘蛛池模板: 固原市| 栾城县| 惠东县| 长沙市| 沙坪坝区| 镇康县| 兴宁市| 吉木萨尔县| 津市市| 博客| 赤壁市| 南丹县| 正宁县| 洞头县| 嘉荫县| 灵石县| 衡水市| 香河县| 白水县| 报价| 章丘市| 永修县| 宁都县| 邵武市| 任丘市| 临沭县| 花垣县| 贡觉县| 江孜县| 西吉县| 柞水县| 余江县| 运城市| 中阳县| 黄大仙区| 磴口县| 商城县| 商南县| 昭平县| 禹城市| 穆棱市|