Big Data Management Administrator Guide
> Running Mappings on a Cluster with Kerberos Authentication
Running Mappings on a Cluster with Kerberos Authentication
This chapter includes the following topics:
•
Running Mappings with Kerberos Authentication Overview
•
Running Mappings in a Kerberos-Enabled Hadoop Environment
•
User Impersonation with Kerberos Authentication
•
Running Mappings in the Native Environment
•
Configure the Analyst Service