The Kerberos network authentication protocol enables client/server applications to identify one another in a secure manner, even when communicating over an unsecured network.
In Kerberos terminology, individual applications are called principals. Each principal has a keytab file, which contains its key, or password. Keytab files enable principals to authenticate automatically, without human interaction. When one principal wants to communicate with another, it uses its keytab file to obtain a ticket. It then uses its ticket to gain access to the other principal.
Because Kerberos authentication uses strong encryption, it can work over unsecured networks. Additionally, tickets can be configured to expire after a set period of time to minimize risk should they become compromised.
You can configure BDD to use Kerberos authentication for its communications with Hadoop. This is required if Kerberos is already enabled in your Hadoop cluster, and strongly recommended for production environments in general. BDD supports integration with Kerberos 5+.
This procedure assumes you already have Kerberos installed on your system and configured for your Hadoop cluster.
To enable Kerberos:
You must also set the Kerberos-related properties in BDD's configuration file. For more information, see Configuring BDD.