HBase Security Configuration
To enable HBase to work with Kerberos security on your Hadoop cluster, make sure you perform the installation and configuration steps in Configuring Hadoop Security in CDH4 and ZooKeeper Security Configuration.
These instructions have been tested with CDH 4 and MIT Kerberos 5 only.
Although an HBase Thrift server and an HBase REST server can connect to a secured Hadoop cluster, access is not secured from clients to the HBase Thrift and REST servers.
|<< Previous: Using curl to access an URL Protected by Kerberos HTTP SPNEGO||Next: Overview of HBase Security Configuration >>|