Social Icons

Bored? Watch this game and get refreshed

Informatica Big Data Management Security Guide

Informatica Big Data Management Security Guide


Table of Contents for above
Preface ....................................................................... 6
Informatica Resources................................................... 6
Informatica My Support Portal........................................... 6
Informatica Documentation............................................. 6
Informatica Product Availability Matrixes..................................... 6
Informatica Web Site................................................. 7
Informatica How-To Library............................................. 7
Informatica Knowledge Base............................................ 7
Informatica Support YouTube Channel...................................... 7
Informatica Marketplace............................................... 7
Informatica Velocity.................................................. 7
Informatica Global Customer Support...................................... 7
Chapter 1: Introduction to Big Data Management Security ...................... 9
Overview............................................................ 9
Authentication........................................................ 10
Kerberos Authentication.............................................. 10
Authorization........................................................ 11
HDFS Permissions.................................................. 11
User Impersonation................................................. 11
Data and Metadata Management........................................... 12
Cloudera Navigator and Metadata Manager.................................. 12
Data Security........................................................ 12
Chapter 2: Running Mappings with Kerberos Authentication................... 14
Running Mappings with Kerberos Authentication Overview........................... 14
Requirements for the Hadoop Cluster......................................... 15
Prerequisite Tasks for Running Mappings on a Hadoop Cluster with Kerberos Authentication..... 15
Install the JCE Policy File for AES-256 Encryption............................. 16
Verify Permissions on the Hadoop Warehouse................................ 16
Configure Kerberos Security Properties in hive-site.xml.......................... 16
Setting up the Kerberos Configuration File.................................. 18
Running Mappings in the Hadoop Environment when Informatica Does not Use Kerberos
Authentication........................................................ 20
Step 1. Create Matching Operating System Profile Names........................ 21
Step 2. Create the Principal Names and Keytab File in the AD KDC.................. 21
Step 3. Specify the Kerberos Authentication Properties for the Data Integration Service..... 21
Running Mappings in a Hadoop Environment When Informatica Uses Kerberos Authentication.... 22
Step 1. Set up the One-Way Cross-Realm Trust............................... 22
Step 2. Create Matching Operating System Profile Names........................ 24
4 Table of Contents
Step 3. Create an SPN and Keytab File in the Active Directory Server................. 24
Step 4. Specify the Kerberos Authentication Properties for the Data Integration Service..... 25
Running Mappings in the Native Environment when Informatica Uses Kerberos Authentication.... 25
Running Mappings in the Native Environment When Informatica Does not Use Kerberos
Authentication........................................................ 26
Kerberos Authentication for a Hive Connection................................... 26
Kerberos Authentication for an HBase Connection................................ 27
Kerberos Authentication for an HDFS Connection................................. 28
Metadata Import in the Developer Tool........................................ 28
Create and Configure the Analyst Service...................................... 29
Chapter 3: User Impersonation with Kerberos Authentication.................. 30
User Impersonation.................................................... 30
Create a Proxy Directory for Clusters that Run MapR.............................. 31
User Impersonation in the Hadoop Environment.................................. 31
Step 1. Enable the SPN of the Data Integration Service to Impersonate Another User....... 32
Step 2. Specify a User Name in the Hadoop Connection......................... 32
User Impersonation in the Native Environment................................... 33
Step 1. Login to the Kerberos Realm...................................... 33
Step 2. Specify the Kerberos Authentication Properties for the Data Integration Service..... 33
Step 3. Configure the Execution Options for the Data Integration Service............... 34
Step 4. Specify the URL for the Hadoop Cluster in the Connection Properties............ 34
Step 5. Configure the Mapping Impersonation Property.......................... 34
Chapter 4: Blaze Engine Security............................................. 35
Blaze Engine Security Overview............................................ 35
Setting up a Blaze User Account............................................ 35

No comments:

Post a Comment

Please share your comments