Please note: Pentaho's offices will be closed Monday May 29th in observance of Memorial Day as we honor and celebrate our Veterans.
Because of this, you may notice a small delay in response from Pentaho. Thanks for understanding, and Happy Memorial Day!

Guidelines - Pentaho Tools & Integrated Authentication Methods

Your feedback is important to us!  Email us how we can improve these documents.

Software Version
Pentaho  5.4, 6.x, 7.0

Overview

This document gives a brief description of the different authentication methods recommended for the Pentaho Tools when using them in a Big Data clustering environment.

Some of the things discussed here include background information about each tool and the preferred authentication method for each.

    -  Guidelines - Pentaho Tools & Integrated Authentication Methods 

Have more questions? Submit a request

Comments

Powered by Zendesk