Hitachi Vantara Pentaho Customer Portal

Guidelines - Pentaho Tools & Integrated Authentication Methods

Your feedback is important to us!  Email us how we can improve these documents.


This document gives a brief description of the different authentication methods recommended for the Pentaho Tools when using them in a Big Data clustering environment.

Some of the things discussed here include background information about each tool and the preferred authentication method for each.

Software Version PDF
Pentaho  6.x, 7.x, 8.0  

The Components Reference in Pentaho Documentation has a complete list of supported software and hardware.

Have more questions? Submit a request


Powered by Zendesk