Guidelines - Pentaho Tools & Integrated Authentication Methods

Your feedback is important to us!  Email us how we can improve these documents.

Software Version
Pentaho  5.4, 6.x, 7.0

Overview

This document gives a brief description of the different authentication methods recommended for the Pentaho Tools when using them in a Big Data clustering environment.

Some of the things discussed here include background information about each tool and the preferred authentication method for each.

    -  Guidelines - Pentaho Tools & Integrated Authentication Methods 

Have more questions? Submit a request

Comments

Powered by Zendesk