HBase security configuration

As HBase becomes more and more popular, different users and groups may store more data in a shared HBase cluster. You might not like all users having full permission to every HBase table. This adds risks to your data, for example, security risks or missed data operation.

Newer HBase releases (0.92 and above) have Kerberos-based security support. With this, user identities are verified by Kerberos, and only authenticated users are allowed to access data in a secured HBase cluster.

We will describe how to configure secure client access to HBase in this recipe.

Getting ready

Make sure you are using the security-enabled HBase release. If you are downloading from the official HBase site, the filename should look like hbase-0.92.1-security.tar.gz ...

Get HBase Administration Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.