HBase Security Configuration
There are two major parts in the process of configuring HBase security:
- Configure HBase Authentication: You must establish a mechanism for HBase servers and clients to securely identify themselves with HDFS, ZooKeeper, and each other (called authentication). This ensures that, for example, a host claiming to be an HBase Region Server or a particular HBase client are in fact who they claim to be.
- Configure HBase Authorization: You must establish rules for the resources that clients are allowed to access (called authorization).
For more background information, see this blog post.
To enable HBase to work with Kerberos security on your Hadoop cluster, make sure you perform the installation and configuration steps in Configuring Hadoop Security in CDH4 and ZooKeeper Security Configuration.
These instructions have been tested with CDH 4 and MIT Kerberos 5 only.
Although an HBase Thrift server and an HBase REST server can connect to a secured Hadoop cluster, access is not secured from clients to the HBase Thrift and REST servers.