Your feedback is important to us! Email us how we can improve these documents.
This document gives a brief description of the different authentication methods recommended for the Pentaho Tools when using them in a Big Data clustering environment.
Some of the things discussed here include background information about each tool and the preferred authentication method for each.
|Pentaho||6.x, 7.x, 8.0|
The Components Reference in Pentaho Documentation has a complete list of supported software and hardware.