Security
Also available as:
PDF

Chapter 3. Configuring Authorization in Hadoop