User Impersonation
You can enable different users to run mappings in a Hadoop cluster that uses Kerberos authentication or connect to big data sources and targets that use Kerberos authentication. To enable different users to run mappings or connect to big data sources and targets, you must configure user impersonation.
You can configure user impersonation for the native or Hadoop environment.
Before you configure user impersonation, you must complete the following prerequisites:
- •Complete the prerequisite tasks for running mappings on a Hadoop cluster with Kerberos authentication.
- •Configure Kerberos authentication for the native or Hadoop environment.
- •If the Hadoop cluster uses MapR, create a proxy directory for the user who will impersonate other users.
If the Hadoop cluster does not use Kerberos authentication, you can specify a user name in the Hadoop connection to enable the Data Integration Service to impersonate that user.
If the Hadoop cluster uses Kerberos authentication, you must specify a user name in the Hadoop connection.