6. Security#
- 6.1. Coordinator Kerberos Authentication
- 6.2. CLI Kerberos Authentication
- 6.3. LDAP Authentication
- 6.4. Password File Authentication
- 6.5. User Mapping
- 6.6. Java Keystores and Truststores
- 6.7. Built-in System Access Control
- 6.8. LDAP group provider
- 6.9. Secrets
- 6.10. Secure Internal Communication
- 6.11. Query Audit
- 6.12. Event Logger
- 6.13. Role Based Access Control
- 6.14. System Level Security with Apache Ranger
- 6.15. Hive Level Security with Apache Ranger
- 6.16. Hive Level Security with Apache Sentry
- 6.17. User Impersonation
- 6.18. Kerberos Credential Passthrough
- 6.19. Okta Authentication