Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Additional security information, including client APIs, the authentication process, developing authorization extensions, and authorization policies is covered in the Platform Security section of the Platform Guide.

We recommend that in order for CDAP to be secure, CDAP security should always be used in conjunction with secure Hadoop clusters. In cases where secure Hadoop is not or cannot be used, it is inherently insecure and any applications running on the cluster are effectively "trusted”. Although there is still value in having perimeter security, authorization enforcement and secure storage in that situation, whenever possible a secure Hadoop cluster should be employed with CDAP security.

...