This is the documentation for Cloudera 5.4.x. Documentation for other versions is available at Cloudera Documentation.

Cloudera Security

This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. This topic also provides information about Hadoop security programs and shows you how to set up a gateway to restrict access.

Cloudera strives to consolidate security configurations across several projects. The process of securing an enterprise data hub comprises at least the following operations:
  • Perimeter Security and Authentication: Guarding access to the system, its data, and its various services.
  • Entitlement and Access: Defining and enforcing what users and applications can do with data.
  • Data Protection: Protecting data from unauthorized access either while at rest or in transit.

Continue reading:

Page generated September 24, 2015.