The following sections describe methods for securing your BDD
cluster.
Additional information on BDD security is available in the
Security Guide.
Kerberos
The Kerberos network authentication protocol enables client/server applications to identify one another in a secure manner, even when communicating over an unsecured network.
Sentry
Sentry provides role-based authorization in Hadoop clusters. Among other things, it can be used to restrict access to Hive data at a granular level.
TLS/SSL
BDD can be installed on Hadoop clusters secured with TLS/SSL.
HDFS data at rest encryption
HDFS data at rest encryption allows data to be stored in encrypted HDFS directories called encryption zones. All files within an encryption zone are transparently encrypted and decrypted on the client side, meaning decrypted data is never stored in HDFS.
Other security options
You can further protect BDD by installing it behind a firewall and enabling TLS/SSL on Studio's outward-facing ports.