Best Practices Guide for Systems Security Services Daemon Configuration and Installation – Part 1
-
Background
Authentication is a basic security requirement for any computing environment. In simple terms, users and services must prove their identity (authenticate) to the system before they can use system features. Kerberos provides strong authentication which is used in the exchange between requesting user or process and service during authentication. When a user authenticates to a particular Hadoop component, the user’s Kerberos principal is presented. The principal is presented in the form user@REALM. The Kerberos principal is mapped [1] to a short name after authentication.
The post Best Practices Guide for Systems Security Services Daemon Configuration and Installation – Part 1 appeared first on Cloudera Engineering Blog.
https://blog.cloudera.com/blog/2019/07/best-practices-guide-for-systems-security-services-daemon-configuration-and-installation-part-1/
© Lightnetics 2024