LogoLogo
search
⌘Ctrlk
  • Pentaho Documentation
LogoLogo
  • Administer Pentaho Data Integration and Analytics 11.0
    • Manage the Pentaho system
    • Secure the Pentaho system
      • User security
      • Big data security
        • Kerberos authentication versus secure impersonation
        • Pentaho and CDP security
    • Optimize the Pentaho system
    • Legacy optimization pages
    • Troubleshoot the Pentaho system
    • Developer center
    • platform-javascript-apis
    • Customize Pentaho products
    • Embed and extend Pentaho functionality
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Administer Pentaho Data Integration and Analytics 11.0chevron-right
  2. Secure the Pentaho system

Big data security

Kerberos authentication versus secure impersonationchevron-rightPentaho and CDP securitychevron-right
PreviousServer-Side Request Forgery preventionchevron-leftNextKerberos authentication versus secure impersonationchevron-right

Last updated 7 months ago

Was this helpful?

LogoLogo

About

  • Pentaho.com

Support

  • Pentaho Support

Resources

  • Privacy

© 2025 Hitachi Vantara LLC

Was this helpful?