Describes how to configure MapR security and manage secure clusters.
Configuring Mapr Security
Provides usage information for frequently used security functionality, including Access Control Lists (ACLs), Access Control Expressions (ACEs), file permissions, and subnet whitelisting.
Managing Impersonation
Provides instructions for enabling and using MapR impersonation features.