# Specify Kerberos security

Perform the following steps to specify the credentials for your Kerberos security.

1. Select **Kerberos** as your security type.
2. Click **Next** to select your Kerberos security method.
3. Choose one of the following security methods and specify the Kerberos credentials you obtained from your cluster administrator:
   * **Password**: Specify the **Authentication username** and **Password** options.

     ![Password options for Hadoop cluster secured with Kerberos](https://3411831820-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAYwCj9fPr1B2pjC11IOQ%2Fuploads%2Fgit-blob-b8534387f1105dd50c0b88f11d91d2123a173cc1%2FssPDI_HadoopCluster_KerberosSecurity_PasswordMethod.png?alt=media)

     If you are connected to the Pentaho Repository and are using secure impersonation, specify the additional **Impersonation username** and **Password** options. See **Try Pentaho Data Integration and Analytics** if your environment requires advanced settings, your server is on Windows, or you are using a Cloudera Impala database for secure impersonation.
   * **Keytab**: Specify the **Authentication username** and **Authentication Keytab** options. Click **Browse** to navigate to your keytab file.

     ![Keytab options for Hadoop cluster secured with Kerberos](https://3411831820-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAYwCj9fPr1B2pjC11IOQ%2Fuploads%2Fgit-blob-243a3901a530c0915b3f1824ba8a697c7cb0bb70%2FssPDI_HadoopCluster_KerberosSecurity_KeytabMethod.png?alt=media)

     If you are connected to the Pentaho Repository and are using secure impersonation, specify the additional **Impersonation username** and **Impersonation Keytab** options. See **Try Pentaho Data Integration and Analytics** if your environment requires advanced settings, your server is on Windows, or you are using a Cloudera Impala database for secure impersonation.
4. Click **Next** to test your connection. See [Configure and test connection](https://docs.pentaho.com/pdia-data-integration/9.3-data-integration/advanced-topics-pentaho-data-integration-overview/connecting-to-a-hadoop-cluster-with-the-pdi-client-article/adding-a-cluster-connection-connect-to-a-hadoop-cluster-with-the-pdi-client/test-the-cluster-connection-add-hadoop-cluster-connection) for more information.

After you specify your security credentials, PDI tests the connection to your Hadoop cluster. If no errors occur during the connection, PDI is successfully connected to your Hadoop cluster.

**Note:** You can define different principal users for each of your named connections only if all the clusters for these connections are in the same Kerberos realm. See [MIT Kerberos Documentation](https://web.mit.edu/kerberos/krb5-devel/doc/admin/realm_config.html) for more information about Kerberos realms.

If you have problems, see troubleshooting sections of the **Administer Pentaho Data Integration and Analytics** document to resolve the errors, then test your connection again.
