Configuring Authentication with Kerberos
Also available as:
PDF
loading table of contents...

Configuring Storm for Kerberos

This section describes how to configure Storm for Kerberos security on an Ambari-managed cluster.