Chapter 1. Overview
This chapter describes how to configure Storm for Kerberos security on an Ambari-managed cluster.
For information about configuring Storm for Kerberos security on a cluster that is not managed by Ambari, see the Non-Ambari Cluster Installation Guide.