Maximum Use of Kerberos

To make maximum use of Kerberos in your secured MapR installation, set the security options indicated in this section.

These instructions are streamlined to allow you to quickly implement security in a MapR cluster, by using Kerberos wherever it is supported. For instructions on configuring a custom security implementation, covering the full range of options that are available, see Configuring MapR Security.

The flowchart below provides an overview of the tasks you will complete, based on the combination of components you are using. ("A" connectors indicate continuation of flow from first to second.)