Where is more information on configuring a MapR Secure Cluster and User Impersonation?
The documentation for configuring a MapR cluster with Security can be found here
For more information on managing User Impersonation see
Note: Starting in MapR 5.2 Impersonation can be enabled for any user
Maybe I can help to clarify the question a bit.
A secure cluster is a pretty complicated beast because most people don't have a very deep understanding of computer and network security in the first place. Security is as much about policy as technology. Security features aren't checkboxes that *must* be checked, but rather chosen one by one based on understanding how much of it is really needed within the broader organization's security strategy.
Security in the context of a distributed compute and storage platform like MapR means platform-level security + ecosystem level security.
At the platform level (see: MapR Security and Data Governance | MapR ), we'd think of the basics like user authentication and authorization, data encryption (wire, files) and access controls and so on. MapR, as far as it goes, is relatively simple to configure to enable security. Refer to MapR documentation mentioned above.
Impersonation is a pretty advanced feature. Most jobs run on services that are running under their own user (such as user mapr). But in a secure environment, we'd want to honor the security levels of users launching the jobs. This requires impersonation. It needs to be enabled on a per application basis, for each ecosystem application used, if it supports impersonation.
This brings us to the second level of Security on a platform like the MapR CDP: ecosystem security. Each component needs to be secured one by one, there is very little that is automatically configured at the platform level. So if you want each one like Spark UI or Drill UI to support authentication, encryption and so on, that needs to be configured one by one. Example: Spark on YARN security: Security for Spark on YARN
Retrieving data ...