Big Data Management Security Guide
> Running Mappings with Kerberos Authentication
Running Mappings with Kerberos Authentication
This chapter includes the following topics:
•
Running Mappings with Kerberos Authentication Overview
•
Requirements for the Hadoop Cluster
•
Running Mappings in the Hadoop Environment when Informatica Does not Use Kerberos Authentication
•
Running Mappings in a Hadoop Environment When Informatica Uses Kerberos Authentication
•
Running Mappings in the Native Environment when Informatica Uses Kerberos Authentication
•
Running Mappings in the Native Environment When Informatica Does not Use Kerberos Authentication
•
Metadata Import in the Developer Tool
•
Create and Configure the Analyst Service