Hadoop Security Guide
Also available as:
PDF

Securing Phoenix

To configure Phoenix to run in a secure Hadoop cluster, use the instructions on this page.