Security Guide : 10. Configuring Vector to Use Kerberos
 
Share this page                  
Configuring Vector to Use Kerberos
In This Chapter
This chapter discusses the authentication of Vector or Vector in Hadoop users for accessing the database. It does not discuss configuring Vector in Hadoop for use on a Kerberos-enabled Hadoop cluster.
For information on the latter, see the chapter “Vector in Secure Hadoop.”