There are two major parts in the process of configuring HBase security:
- Configure HBase Authentication: You must establish a mechanism for HBase servers and clients to securely identify themselves with HDFS, ZooKeeper, and each other (called authentication). This ensures that, for example, a host claiming to be an HBase Region Server or a particular HBase client are in fact who they claim to be.
- Configure HBase Authorization: You must establish rules for the resources that clients are allowed to access (called authorization). For more information, see Configuring HBase Authorization.
For more background information, see this blog post.