Security overview

Learn how to set up security for SRM.

SRM can operate in both secure and unsecure environments, as well as a mix of both. In addition, it can also connect to clusters that have differing security setups. Configuring security can be achieved by adding the appropriate security related properties to your configuration file. The properties set should match the security setup of the cluster or clusters that SRM is connecting to.