Integrating Enterprise Identity Management systems
Typically, organizations have a central user identity management system known as Enterprise Identity Management (EIM) system using products such as IBM Tivoli Identity Manager, Oracle Identity Manager, and Windows Active Directory. Enterprise user's access privileges are centrally managed in these systems. These systems manage the user credentials and their roles using groups. User authorization is managed using these security groups. Users are assigned to groups, where each group has a specific authorization and access privilege defined. The user inherits group privileges based on their group membership.
By default, Hadoop uses the logged in Operating System (OS) users and the corresponding user groups to provide the authorization within Hadoop. Hadoop daemons (NameNode, DataNode, and so on) and ecosystem components such as Oozie, Hive, HBase uses these group memberships to determine the level of authorization allowed for the user. By default...