官术网_书友最值得收藏!

User authentication

Hadoop can use the native user-authentication methods of the server. For example, in Linux-based machines, users can be authenticated based on the IDs defined in the system's /etc/passwd files. In other words, Hadoop inherits the user authentication set up on the server side.

User authentication via Kerberos, a cross-platform authentication protocol, is also commonly used in Hadoop clusters. Kerberos works based on a concept of tickets that grant privileges to users on a temporary as-needed basis. Tickets can be invalidated using Kerberos commands, thus restricting the users' rights to access resources on the cluster as needed.

Note that even if the user is permitted to access data (user authentication), he or she can still be limited in what data can be accessed due to another feature known as authorization. The term implies that even if the user can authenticate and log in to the system, the user may be restricted to only the data the user is authorized to access. This level of authorization is generally performed using native HDFS commands to change directory and file ownerships to the named users.

主站蜘蛛池模板: 鄂伦春自治旗| 吉林省| 兴隆县| 吉林市| 微山县| 名山县| 尚义县| 乌恰县| 屯留县| 大港区| 晋城| 从化市| 拜城县| 潼南县| 紫金县| 德江县| 宁远县| 古田县| 河西区| 民权县| 区。| 奈曼旗| 棋牌| 云霄县| 成都市| 从江县| 体育| 冷水江市| 错那县| 财经| 南雄市| 仙桃市| 中江县| 水富县| 宝清县| 大连市| 唐海县| 巫山县| 凯里市| 封丘县| 农安县|