LogoLogo
Ctrlk
Try Pentaho Data Integration and Analytics
  • Pentaho Documentation
  • Administer Pentaho Data Integration and Analytics 10.2
  • Manage the Pentaho system
  • Secure the Pentaho system
    • User security
    • Big data security
      • Kerberos authentication versus secure impersonation
        • Prerequisites
        • Supported components
        • How to enable secure impersonation
        • How to enable Kerberos authentication
          • Set Up Kerberos for Pentaho
          • Use Kerberos with MongoDB
          • Use Kerberos with Spark Submit
          • Use Knox to access CDP
      • Pentaho and CDP security
  • Optimize the Pentaho system
  • Troubleshoot the Pentaho system
  • Developer center
  • Customize Pentaho products
  • Embed and extend Pentaho functionality
Powered by GitBook
On this page
  1. Secure the Pentaho system
  2. Big data security
  3. Kerberos authentication versus secure impersonation

How to enable Kerberos authentication

The following articles explain how to use Kerberos with different components.

  • Set Up Kerberos for Pentaho

  • Use Kerberos with MongoDB

  • Use Kerberos with Spark Submit

  • Use Knox to access CDP

PreviousHow to enable secure impersonationNextSet Up Kerberos for Pentaho

Last updated 4 months ago

LogoLogo

About

  • Pentaho.com

Support

  • Pentaho Support

Resources

  • Privacy

© 2025 Hitachi Vantara LLC