Hadoop Auth

Hadoop Auth

Copyright: © 2019 |Pages: 24
ISBN13: 9781522537908|ISBN10: 1522537902|ISBN13 Softcover: 9781522586951|EISBN13: 9781522537915
DOI: 10.4018/978-1-5225-3790-8.ch010
Cite Chapter Cite Chapter

MLA

T. Revathi, et al. "Hadoop Auth." Big Data Processing With Hadoop, IGI Global, 2019, pp.216-239. https://doi.org/10.4018/978-1-5225-3790-8.ch010

APA

T. Revathi, K. Muneeswaran, & M. Blessa Binolin Pepsi (2019). Hadoop Auth. IGI Global. https://doi.org/10.4018/978-1-5225-3790-8.ch010

Chicago

T. Revathi, K. Muneeswaran, and M. Blessa Binolin Pepsi. "Hadoop Auth." In Big Data Processing With Hadoop. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-3790-8.ch010

Export Reference

Mendeley
Favorite

Abstract

One of the factors for the reliability of the services is authentication, which decides who can access what services. Since big data offers a wide variety of services, authentication becomes one of the main criteria for consideration. This chapter outlines the features of the security services in terms of the requirements and the issues in the business services. This chapter also gives a little background about the services in the cloud and the interaction between clients and services in the cloud, emphasizing the security services. The authentication procedure with the authentication protocol, Kerberos SPNEGO, which is offered as a security service in Hadoop, is introduced. The configuration details in a typical browser (Mozilla Firefox) are detailed. The usage of the Linux command curl is introduced in this chapter. The command to key distribution center “kinit” is outlined. Also, the procedure for accessing the server within the Java code is given. A section on server-side configuration speaks about the Maven repository, which holds all the necessary library Jar files organized as local, central, and remote. The explanation for the configuration is given with a typical XML file. Also, the usage of Simple Logging Facade for Java is introduced. The configuration has many parameters with its values and they are tabulated for better perception. The use of LDAP server, which is one of the lightweight directory access protocols, is introduced. Also, the provision for multi-scheme configuration is outlined with an example configuration file. The facilities available to provide advanced security features using signer secret provide are highlighted with appropriate examples for the parameter name and parameter value.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.