Chapter 1. Overview

This chapter describes how to configure Storm for Kerberos security on an Ambari-managed cluster.

For information about configuring Storm for Kerberos security on a cluster that is not managed by Ambari, see Configure Kerberos Authentication for Storm in the Manual Install Guide.