logo

Authorization and Authentication in Hive - DOC - Desklib

   

Added on  2020-02-24

5 Pages987 Words57 Views
Running head: OPTIONS AVAILABLE FOR AUTHORIZATION AND AUTHENTICATIONIN HIVE 1Options available for authorization and authentication in HiveNameInstitutionProfessorCourseDate

OPTIONS AVAILABLE FOR AUTHORIZATION AND AUTHENTICATION IN HIVE 2IntroductionHive authorization and authentication are two different terms that are used to give accessto the Hive. In a Hive security measures, system are designed to provide security screeningbefore a user can be allowed into the system. System authentication is used to provideverification identity of all users. It determines if users logged into the system are real ones or not(Bansal, 2016). Similarly, authorization is used to ascertain whether user trying to access thesystem have required privileges to perform some actions. After logging into the system, userresponsibilities are categorized according to roles they play in the organization and their areas ofexpertise. It is through authorization where some users are given capability to enter data into thesystem but they cannot alter or delete while others are able to just view without any furtheraction. Due to roles and responsibilities assigned to various users, these two security measuresprovide various options to manipulate the system.Hive Authorization modelsAfter user logs into the system, Hive grants permission in various categories namely;Hive Default Authorization which does not provide required complete access model of thesystem and leaves many security gaps which has to be addressed in order to protect data (Du,2015). In this case, users are able to grant or revoke themselves permission from the system. InHive operations to grant permission to either groups, users and roles, if user privileges whichdetermines if privileges has been granted, groups privileges checks whether user is part of thegroup already granted permission and Roles privileges which checks on roles granted toprivileges (Shaw et al, 2016). Next, in Storage Based Authorization (SBA) at Metastore, Hivemakes use of HDFS permissions provided at folder level in relation to metadata objects whichserves as authorization policy source of truth. By enabling SBA in metastore, when a given user

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Configure a MySQL Database
|8
|1129
|93

User Manual for Stock and Roster Management System
|10
|1791
|333

DB-Creato: Fixed Server/ Database Roles that Exist in SQL Server
|4
|901
|72

Data Modelling SQL Languages Tasks 2022
|17
|1799
|22

Analysis of Security Vulnerability of WidgetsInc Virtual Machine Image
|23
|3636
|97

Computer Security
|18
|3268
|86