Security Guide > Security Guide > Configuring Vector to Use Kerberos
Was this helpful?
Configuring Vector to Use Kerberos
In This Chapter
This chapter discusses the authentication of Vector or Vector in Hadoop users for accessing the database. It does not discuss configuring Vector in Hadoop for use on a Kerberos-enabled Hadoop cluster.
For information on the latter, see the chapter “Vector in Secure Hadoop.”
Last modified date: 01/26/2023