Best Practice - Pentaho Big Data Integrated Authentication

Your feedback is important to us!  Email us how we can improve these documents.

Overview

This document covers best practices on methods and strategies to execute/authenticate users with Big Data.

The intention of this document is to speak about topics generally; however, these are the specific versions covered here:

Software Version
Pentaho  5.4, 6.x, 7.0

 

Best Practice - Pentaho Big Data Integrated Authentication

Have more questions? Submit a request

Comments

Powered by Zendesk