Integrating Sentry

Integrate Sentry with other ecosystem components to enable those components to use Sentry authorization. You can also integrate Sentry with Hue in order to use the Hue Security application to manage Sentry privileges and roles.

You can configure Sentry to provide authorization in the following scenarios:
Sentry Version Sentry Storage Mode Component Integration Cluster Security
1.6.0 Database Impala 2.2.0/2.5.0 and Hive 1.2.1
  • Insecure cluster
  • Secure cluster with Kerberos authentication
1.6.0 Database Sqoop2 Secure cluster with Kerberos authentication
1.6.0 File-Based Impala 2.2.0/2.5.0 and Hive 1.2.1
  • Insecure cluster
  • Secure cluster with Kerberos authentication
1.4.0 File-Based Impala 1.4.1 and Hive 0.13
  • Insecure cluster
  • Secure cluster without Kerberos authentication for Hive
NOTE:
  • When you configure Impala to use Sentry authorization, Impala and Hive both must use Sentry for authentication. Also, impersonation cannot be enabled for Hive.
  • For clusters with Hive but not Impala, authorization can be implemented using Hive’s native authorization mechanisms;Sentry is not needed.