IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hadoop Auth

Hadoop Auth
View Sample PDF
Copyright: 2019
Pages: 24
Source title: Big Data Processing With Hadoop
Source Author(s)/Editor(s): T. Revathi (Mepco Schlenk Engineering College, India), K. Muneeswaran (Mepco Schlenk Engineering College, India)and M. Blessa Binolin Pepsi (Mepco Schlenk Engineering College, India)
DOI: 10.4018/978-1-5225-3790-8.ch010

Purchase

View Hadoop Auth on the publisher's website for pricing and purchasing information.

Abstract

One of the factors for the reliability of the services is authentication, which decides who can access what services. Since big data offers a wide variety of services, authentication becomes one of the main criteria for consideration. This chapter outlines the features of the security services in terms of the requirements and the issues in the business services. This chapter also gives a little background about the services in the cloud and the interaction between clients and services in the cloud, emphasizing the security services. The authentication procedure with the authentication protocol, Kerberos SPNEGO, which is offered as a security service in Hadoop, is introduced. The configuration details in a typical browser (Mozilla Firefox) are detailed. The usage of the Linux command curl is introduced in this chapter. The command to key distribution center “kinit” is outlined. Also, the procedure for accessing the server within the Java code is given. A section on server-side configuration speaks about the Maven repository, which holds all the necessary library Jar files organized as local, central, and remote. The explanation for the configuration is given with a typical XML file. Also, the usage of Simple Logging Facade for Java is introduced. The configuration has many parameters with its values and they are tabulated for better perception. The use of LDAP server, which is one of the lightweight directory access protocols, is introduced. Also, the provision for multi-scheme configuration is outlined with an example configuration file. The facilities available to provide advanced security features using signer secret provide are highlighted with appropriate examples for the parameter name and parameter value.

Related Content

N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest. © 2024. 19 pages.
Praveen Kakada, Muhammed Shafi M. K.. © 2024. 14 pages.
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan. © 2024. 15 pages.
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest. © 2024. 15 pages.
S. Sivabala, P. Vidyasri. © 2024. 23 pages.
H. Hajra, G. Jayalakshmi. © 2024. 22 pages.
Anusha Thakur. © 2024. 15 pages.
Body Bottom