In this episode, we discuss this fortnight’s interesting big data news that caught our eye and then go on to discuss the basics around authentication in Hadoop for what is the first in a series of episodes that we’ll be doing over the next few months on the broad topic of security.
Podcast: Play in new window | Download (Duration: 1:07:49 — 39.1MB)
Subscribe: Apple Podcasts | Spotify | RSS | More
00:00 Recent events
- Dave:
- The new science behind customer loyalty
- 5 great charts in 5 lines of R code
- Using big data to create value for customers, not just target them
- Jhon:
- Linux turns 25 (25 August 1991 )
- Hadoop 2.7.3 a minor release in the 2.x.y release line, building upon the previous stable release 2.7.2
- Specification work related to the Hadoop Compatible Filesystem (HCFS) effort. Hadoop in the cloud/as a service getting a lot of attention lately
- Facebook open sources image-recognition AI with live video in mind
- NoSQL Databases: a Survey and Decision Guidance
- Committer criteria from Apache
- Maybe they should just have referred to our podcast! 🙂
40:20 Security in Hadoop – Authentication
- What is Authentication?
- Why is it important?
- When should I do it?
- Hadoop is insecure by default without strong Authentication
- Kerberos
- Active Directory, MIT Kerberos and FreeIPA
01:07:49 End
Please use the Contact Form on this blog or our twitter feed to send us your questions, or to suggest future episode topics you would like us to cover.
Hi,
a) Why did you named that episode “Security in Hadoop – Authorisation” when it’s about authentication 😉
b) you mentioned some sort of Document about security and example how easy it is with a none secure Cluster to change “$user”. Where can i find it?
Keep up the good work!
Thanks in advance
Phil
Hi Phil,
Regarding a): Excellent question… and we really don’t have an answer for you… So we decided to correct the title. All kidding aside, a big thank you for spotting and reporting! This kind of embarrassing thing happens when you plan a series of episodes and then decide to update a blog post late at night… :s
And regarding b) here is a nice blog post by Mikhail Samoylenko that demonstrates a number of vulnerabilities when Kerberos is not enabled:
http://blog.samoylenko.me/2015/05/25/hadoop-without-kerberos-examples/
Bullet 2.2.1 deals specifically with he “$user” example we mentioned in the episode. This example appears in many books and lectures dealing with security on Hadoop.
Thanks again for reporting the error!
Best regards,
Jhon