Security Capabilities

This section describes authentication, authorization, and encryption capabilities. A secure MapR environment is predicated on authentication, authorization, and encryption capabilities.

Restricting access to a specified set of users. Robust authentication prevents third parties from representing themselves as legitimate users.
Restricting an authenticated user's capabilities on the system. Flexible authorization systems enable a system to grant a user a set of capabilities that enable the user to perform desired tasks, but prevents the use of any capabilities outside of that scope.
Restricting an external party's ability to read data. Data transmission between nodes in a secure MapR cluster is encrypted, preventing an attacker with access to that communication from gaining information about the transmission's contents.