Kerberos & Hadoop: Securing Big Data (part II)

Celeste Duran Big Data Architecture, Technology Leave a Comment

In this second part of the Kerberos series, we’re going to review how to configure our system to get a properly secured environment. The post will provide some important tips about the configuration, but it isn’t a typical command guide. Also, if your are starting with the basics, in our previous post Kerberos & Hadoop: Securing Big Data (part I) we …