Hadoop Security Guide
Also available as:
PDF
loading table of contents...

Securing Phoenix

To configure Phoenix to run in a secure Hadoop cluster, use the instructions on this page.