Impersonation in Data Fabric

Describes impersonation in data-fabric, which allows centralized control of access to resources in the file system, HPE Ezmeral Data Fabric Database, and HPE Ezmeral Data Fabric Streams.

Also known as identity assertion, impersonation is one user (authorized to impersonate another) or the mapr super user accessing data and submitting jobs on behalf of another user. Implementing impersonation provides authoritative, end-to-end security for your data-fabric installation, independent of remote authentication and security mechanisms that control user access to application features.

To implement impersonation in data-fabric, there are both data-fabric core and ecosystem component requirements that must be met as well as requirements at the application development level. These requirements are described in Access Control and Impersonation in data-fabric.

When all other requirements are met, enabling impersonation for the mapr superuser or for any other user is a simple task.