Big Data Management Security Guide
> User Impersonation with Kerberos Authentication
User Impersonation with Kerberos Authentication
This chapter includes the following topics:
•
User Impersonation
•
Create a Proxy Directory for Clusters that Run MapR
•
User Impersonation
•
User Impersonation in the Hadoop Environment
•
User Impersonation in the Native Environment