Security Reference Architecture Summary for Cloudera Data Platform
Cloudera
JANUARY 21, 2022
Configured for authentication, authorization, and auditing. Authentication is first configured to ensure that users and services can access the cluster only after proving their identities. Authentication. Signed Certificates are distributed to each cluster host enabling service roles to mutually authenticate.
Let's personalize your content