Security integration
System administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques must review security-related information in Cloudera documentation.
Cloudera documentation provides conceptual overviews and how-to information about setting up various Hadoop components for optimal security, including how to set up a gateway to restrict access. It is assumed that you have basic knowledge of Linux and systems administration practices.