Your feedback is important to us! Email us how we can improve these documents.
|Pentaho||5.4, 6.x, 7.x|
This document gives a brief description of the different authentication methods recommended for the Pentaho Tools when using them in a Big Data clustering environment.
Some of the things discussed here include background information about each tool and the preferred authentication method for each.