Hadoop Security Guide
Also available as:
PDF

Chapter 2.  Authentication