Security
Copyright © 2012-2017 Hortonworks, Inc.
Except where otherwise noted, this document is licensed under Creative Commons Attribution ShareAlike 4.0 License |
2017-07-27
Contents
- 1. Enabling Kerberos
- 2. NiFi Authentication
- 3. SAM Authentication
- 4. Installing Ranger
- 5. Authorization with Ranger
- 6. NiFi Authorization
- 7. SAM Authorization
- 8. Deploying SAM Applications in a Secure Cluster
List of Tables
- 2.1. Identity mapping values
- 4.1. Ranger DB Host
- 4.2. Driver Class Name
- 4.3. Ranger DB Username Settings
- 4.4. JDBC Connect String
- 4.5. DBA Credential Settings
- 4.6. UNIX User Sync Properties
- 4.7. LDAP/AD Common Configs
- 4.8. LDAP/AD User Configs
- 4.9. LDAP/AD Group Configs
- 4.10. UNIX Authentication Settings
- 4.11. LDAP Authentication Settings
- 4.12. AD Settings
- 4.13. LDAP Advanced ranger-ugsync-site Settings
- 4.14. AD Advanced ranger-ugsync-site Settings
- 4.15. Advanced ranger-ugsync-site Settings for LDAP and AD
- 5.1. Policy Details
- 5.2. Allow Conditions
- 5.3. Policy Details
- 5.4. Allow Conditions
- 5.5. Storm User and Group Permissions
- 7.1. Role and Permission Matrix