Your feedback is important to us! Email us how we can improve these documents.
This document covers best practices on methods and strategies to execute/authenticate users with Big Data.
The intention of this document is to speak about topics generally; however, these are the specific versions covered here:
|Pentaho||5.4, 6.x, 7.0|