LogoLogo
Ctrlk
Try Pentaho! - Start your 30 day evaluation today
  • Pentaho Documentation
  • Administer Pentaho Data Integration and Analytics 11.0
    • Manage the Pentaho system
    • Secure the Pentaho system
      • User security
      • Big data security
        • Kerberos authentication versus secure impersonation
          • How to enable secure impersonation
          • How to enable Kerberos authentication
            • Set Up Kerberos for Pentaho
            • Use Kerberos with MongoDB
            • Use Kerberos with Spark Submit
            • Use Knox to access CDP
          • Prerequisites
          • Supported components
        • Pentaho and CDP security
    • Optimize the Pentaho system
    • Troubleshoot the Pentaho system
    • Developer center
    • platform-javascript-apis
    • Customize Pentaho products
    • Embed and extend Pentaho functionality
Powered by GitBook
On this page
  1. Administer Pentaho Data Integration and Analytics 11.0
  2. Secure the Pentaho system
  3. Big data security
  4. Kerberos authentication versus secure impersonation

How to enable Kerberos authentication

The following articles explain how to use Kerberos with different components.

  • Set Up Kerberos for Pentaho

  • Use Kerberos with MongoDB

  • Use Kerberos with Spark Submit

  • Use Knox to access CDP

PreviousHow to enable secure impersonationNextSet Up Kerberos for Pentaho

Last updated 5 months ago

Was this helpful?

LogoLogo

About

  • Pentaho.com

Support

  • Pentaho Support

Resources

  • Privacy

© 2025 Hitachi Vantara LLC

Was this helpful?