Your feedback is important to us! Email us how we can improve these documents.
This document covers best practices on methods and strategies regarding the different options to execute processes and authenticate users with Big Data using the Windows operating system.
Our intended audience is Pentaho administrators or anyone with Pentaho Data Integration (PDI) experience who is interested in improving authentication setups.
|Pentaho||6.x, 7.x, 8.0|
The Components Reference in Pentaho Documentation has a complete list of supported software and hardware.