Author Archives: Gabor Roczei

Best Practices Guide for Systems Security Services Daemon Configuration and Installation – Part 1

Categories: Platform Security & Cybersecurity


Authentication is a basic security requirement for any computing environment. In simple terms, users and services must prove their identity (authenticate) to the system before they can use system features. Kerberos provides strong authentication which is used in the exchange between requesting user or process and service during authentication. When a user authenticates to a particular Hadoop component, the user’s Kerberos principal is presented. The principal is presented in the form user@REALM. The Kerberos principal is mapped [1] to a short name after authentication.

Read more