Hadoop Security Guide
Also available as:
PDF
loading table of contents...

Chapter 2.  Authentication