Big data security
You can choose between two methods of implementing big data security. The security and protection of sensitive data is a major concern of data management today. To assist users in protecting their data, Pentaho provides two methods of implementing security for the Pentaho Server: Kerberos authentication and secure impersonation. Both methods are secure, and require a user to provide proof of identity to securely connect to a cluster. Also see Pentaho and CDP security if you are using a Knox security gateway along with Kerberos authentication for your Cloudera Data Platform (CDP) cluster.
For more information on implementing big data security, see the following topics:
PreviousServer-Side Request Forgery preventionNextKerberos authentication versus secure impersonation
Last updated
Was this helpful?