Security in Event Stream Processor is managed centrally, by the cluster
manager. All projects running in a remote cluster are subject to the security rules defined
for that cluster.
Note: For information on security for all projects running in the local cluster, see the
Studio Users Guide.
Event Stream Processor supports the following authentication methods:
- Kerberos – Kerberos Authentication using ticket-based authentication.
- RSA – RSA certificate-based security. Requires a valid RSA key alias, a keystore
which contains a private key, and the password of the keystore.
- LDAP – Requires a user name and password. Supports role-based policy configuration.
Further refine your security implementation by defining policies that
provide or restrict access to a project or its resources, based on role. For
example, you can define an administrator role that allows full access to all
projects.
- Native OS – Requires a user name and password. Provide the same credentials required to
log on to your machine.