Impersonation in Data Fabric
Describes impersonation in Data Fabric, which allows centralized control of access to resources in the file system, HPE Ezmeral Data Fabric Database, and HPE Ezmeral Data Fabric Streams.
Also known as identity assertion, impersonation is one user (authorized to impersonate
another) or the mapr
super user accessing data and submitting jobs on behalf
of another user. Implementing impersonation provides authoritative, end-to-end security for
your Data Fabric installation, independent of remote
authentication and security mechanisms that control user access to application features.
To implement impersonation in Data Fabric, there are both Data Fabric core and ecosystem component requirements that must be met as well as requirements at the application development level. These requirements are described in Access Control and Impersonation in Data Fabric.
When all other requirements are met, enabling impersonation for the mapr superuser or for any other user is a simple task.