The link I gave in previous mail explains how can you user level
authorizations in hive.



On Mon, Sep 16, 2013 at 7:57 PM, <shouvanik.hal...@accenture.com> wrote:

>  Hi Nitin,****
>
> ** **
>
> I want it secured.****
>
> ** **
>
> Yes, I would like to give specific access to specific users. E.g. “select
> * from” access to some and “add/modify/delete” options to some****
>
> ** **
>
> ** **
>
> “What kind of security do you have on hdfs? “****
>
> I could not follow this question****
>
> ** **
>
> Thanks,****
>
> Shouvanik****
>
> *From:* Nitin Pawar [mailto:nitinpawar...@gmail.com]
> *Sent:* Monday, September 16, 2013 6:50 PM
> *To:* Haldar, Shouvanik
> *Cc:* user@hive.apache.org
> *Subject:* Re: User accounts to execute hive queries****
>
> ** **
>
> You will need to tell few more things. ****
>
> Do you want it secured? ****
>
> Do you distinguish users in different categories on what one particular
> user can do or not? ****
>
> What kind of security do you have on hdfs? ****
>
> ** **
>
> ** **
>
> It is definitely possible for users to run queries on their own username
> but then you have to take few measures as well. ****
>
> which user can do what action. Which user can access what location on hdfs
> etc ****
>
> ** **
>
> For user management on hive side you can read at
> https://cwiki.apache.org/Hive/languagemanual-authorization.html****
>
> ** **
>
> if you do not want to go through the secure way, ****
>
> then add all the users to one group and then grant permissions to that
> group on your warehouse directory. ****
>
> ** **
>
> other way if the table data is not shared then, ****
>
> create individual directory for each user on hdfs and give only that user
> access to that directory. ****
>
> ------------------------------
> This message is for the designated recipient only and may contain
> privileged, proprietary, or otherwise confidential information. If you have
> received it in error, please notify the sender immediately and delete the
> original. Any other use of the e-mail by you is prohibited.
>
> Where allowed by local law, electronic communications with Accenture and
> its affiliates, including e-mail and instant messaging (including content),
> may be scanned by our systems for the purposes of information security and
> assessment of internal compliance with Accenture policy.
>
>
> ______________________________________________________________________________________
>
> www.accenture.com
>



-- 
Nitin Pawar

Reply via email to