HBase Authentication

There are two major parts in the process of configuring HBase security:

  1. Configure HBase Authentication: You must establish a mechanism for HBase servers and clients to securely identify themselves with HDFS, ZooKeeper, and each other (called authentication). This ensures that, for example, a host claiming to be an HBase Region Server or a particular HBase client are in fact who they claim to be.
  2. Configure HBase Authorization: You must establish rules for the resources that clients are allowed to access (called authorization). For more information, see Configuring HBase Authorization.

For more background information, see this blog post.

The following sections describe how to use Apache HBase and CDH 5 with Kerberos security on your Hadoop cluster: