In simple terms, authentication is the process of establishing the truth of an entity. Here, the entity could be a user or service on the network. For example, when you log in to your e-mail account, the e-mail server authenticates you based on your username and password. In almost every organization, the users who are part of the organization's network need to be authenticated before they are able to successfully log on to the network. Once the user is authenticated, the user should be restricted to use only the services to which the user is authorized. Authorization defines all the resources that a user can access or use. An example of the authorization is clearly visible on a Linux system. Every file and directory has permissions associated with them. These permissions decide which user can read, write, or access the file or directory.
Cloudera Administration Handbook
By :
Cloudera Administration Handbook
By:
Overview of this book
Table of Contents (17 chapters)
Cloudera Administration Handbook
Credits
Notice
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Apache Hadoop
HDFS and MapReduce
Cloudera's Distribution Including Apache Hadoop
Exploring HDFS Federation and Its High Availability
Using Cloudera Manager
Implementing Security Using Kerberos
Managing an Apache Hadoop Cluster
Cluster Monitoring Using Events and Alerts
Configuring Backups
Index
Customer Reviews