目录
前言 ..................................................................................................................................... i
关于本指南 ..................................................................................................................... i
目标读者 ......................................................................................................................... i
相关文档 ........................................................................................................................ ii
1. 概览 ............................................................................................................................ 1
1.1 先决条件 (Prerequisites) ..................................................................................... 1
1.2 术语 (Terminology) ............................................................................................. 2
1.2.1 安全系统的基本要素 (Basic elements of a secure system) ........................ 2
1.2.2 其他术语 (Other terminology) ..................................................................... 3
1.3 大数据世界中可用的安全功能概述 .................................................................. 8
1.3.1 Hadoop .......................................................................................................... 8
1.3.2 HBase ............................................................................................................ 8
1.3.3 Hive............................................................................................................... 9
1.4 发行 .................................................................................................................... 10
1.4.1 Cloudera 发行 ............................................................................................. 10
1.4.2 Hortonworks ............................................................................................... 11
2. EsgynDB 安全 .......................................................................................................... 13
2.1 认证方式 ............................................................................................................ 13
2.2 授权 .................................................................................................................... 16
2.3 审计 .................................................................................................................... 19
2.4 数据保护 ............................................................................................................ 20
2.4.1 外部威胁和防火墙 .................................................................................... 20
2.4.2 集群级访问 ................................................................................................ 21
2.5 多租户 ................................................................................................................ 21
文档被以下合辑收录
相关文档
评论