This chapter describes how to configure Storm for Kerberos security on an Ambari-managed cluster.
For information about configuring Storm for Kerberos security on a cluster that is not managed by Ambari, see Configure Kerberos Authentication for Storm in the Manual Install Guide.