There are several ways a user can impersonate another user if you do
not use strong authentication (i.e. kerberos). Some ways are
implemented with that intention, for users who don't want any
On Wed, Sep 4, 2013 at 1:39 AM, fred th <[EMAIL PROTECTED]> wrote:
> I'm considering using hadoop for a share cluster. As start to setup quickly
> the system I'm was planning to differ Kerberos use.
> Is there other way than using Kerberos to forbid a user to use
> hadoop.job.ugi parameter to impersonate another user?