Skip to content

This event was canceled

Details

A breakdown of the authorization and authentication tactics used with Hadoop. This is a big topic but I think it is important to cover the lay of the land with so much happening in this space. It may not be as exciting as a in-memory iterative SGD or Deep Learning, but it is a practical consideration when implementing Hadoop.

This presentation will involve:

  1. Authentication & Authorization

  2. Strong Authentication: To Kerborize or Not to Kerborize...

  3. Authorization services in HDFS, YARN, HBase, and Hive

  4. Security in Architecture: Network, Cluster, Edges & Gateways

  5. Frequently used 3rd party tools and projects

  6. Future of Hadoop Security, Emerging projects/products, and opportunities for contribution

  7. Practical Q&A

*Disclaimer - We will do our best to be vendor neutral and describe the approaches each company takes. However, we will focus on the most commonly implemented security approaches.

You may also like