We had a need to authenticate user requests against AD in a kerberos enabled cluster, and allow “local” hive sessions to use only a keytab. Below are the examples of each. First, we show how to connect over a binary…
Month: June 2015
Credit card tokenization overview
You will often hear of online and in store retailers in which credit card numbers are stolen. This is often due to storing the card numbers locally in an encrypted status. As soon as a hacker obtains the encrypted value,…
Accessing Hive via DBVisualizer
Download the most recent free version of DB Visualizer from the following URL: http://www.dbvis.com/ Execute the downloaded file. If you see the following, it means you have either not installed java, or the installer can’t find where you installed it.…