Best Practices - Pentaho Big Data Integrated Authentication

Your feedback is important to us!  Email us how we can improve these documents.


This document covers best practices on methods and strategies to execute/authenticate users with Big Data.

The intention of this document is to speak about topics generally; however, these are the specific versions covered here:

Software Version
Pentaho  5.4, 6.x, 7.0


Best Practices - Pentaho Big Data Integrated Authentication

Have more questions? Submit a request


Powered by Zendesk