Big Data Management Security Guide > Introduction to Big Data Management Security > Overview
  

Overview

You can configure security for Big Data Management and the Hadoop cluster to protect from threats inside and outside the network. Security for Big Data Management includes security for the Informatica domain and security for the Hadoop cluster.
Security for the Hadoop cluster includes the following areas:
Authentication
When the Informatica domain includes Big Data Management, user identities must be authenticated in the Informatica domain and the Hadoop cluster. Authentication for the Informatica domain is separate from authentication for the Hadoop cluster.
By default, Hadoop does not verify the identity of users. To authenticate user identities, you can configure the following authentication protocols on the cluster:
Big Data Management also supports Hadoop clusters that use a Microsoft Active Directory (AD) Key Distribution Center (KDC) or an MIT KDC.
Authorization
After a user is authenticated, a user must be authorized to perform actions. For example, a user must have the correct permissions to access the directories where specific data is stored to use that data in a mapping.
You can run mappings on a cluster that uses one of the following security management systems for authorization:
Data and metadata management
Data and metadata management involves managing data to track and audit data access, update metadata, and perform data lineage. Big Data Management supports Cloudera Navigator and Metadata Manager to manage metadata and perform data lineage.
Data security
Data security involves protecting sensitive data from unauthorized access. Big Data Management supports data masking with the Data Masking transformation in the Developer tool, Dynamic Data Masking, and Persistent Data Masking.
Security for the Informatica domain is separate from security for the Hadoop cluster. For a higher level of security, secure the Informatica domain and the Hadoop cluster. For more information about security for the Informatica domain, see the Informatica Security Guide.

Support for Security Management Systems

Depending on the run-time engine that you use, you can run mappings on a Hadoop cluster that uses a supported security management system.
Hadoop clusters use a variety of security management systems for user authorization and authentication. The following table shows the run-time engines supported for the security management system installed on the Hadoop platform:
Hadoop Distribution
Apache Knox (authentication)
Apache Ranger (authorization)
Apache Sentry (authorization)
HDFS Transparent Encryption (authorization)
SSL/TLS protocol
Amazon EMR 5.0
Not supported
Not supported
Not supported
Not supported
Not supported
Azure HDInsight 3.4
Not supported
Not supported
Not supported
Not supported
Not supported
Cloudera CDH 5.8
Not supported
Not supported
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Hive engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Hive engine
IBM BigInsights 4.2
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Hive engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
Not supported
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
Not supported
Hortonworks HDP 2.5
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Hive engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
Not supported
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
  • - Hive engine
MapR 5.2
  • - Native run-time engine
  • - Blaze engine
  • - Hive engine
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
Not supported
  • - Native run-time engine
  • - Blaze engine
  • - Spark engine
Not supported