Compare the Top Risk-Based Authentication Software that integrates with Hadoop as of June 2025

This a list of Risk-Based Authentication software that integrates with Hadoop. Use the filters on the left to add additional filters for products that have integrations with Hadoop. View the products that work with Hadoop in the table below.

What is Risk-Based Authentication Software for Hadoop?

Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification. Compare and read user reviews of the best Risk-Based Authentication software for Hadoop currently available using the table below. This list is updated regularly.

  • 1
    Apache Sentry

    Apache Sentry

    Apache Software Foundation

    Apache Sentry™ is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster. Apache Sentry has successfully graduated from the Incubator in March of 2016 and is now a Top-Level Apache project. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoop cluster. Sentry currently works out of the box with Apache Hive, Hive Metastore/HCatalog, Apache Solr, Impala and HDFS (limited to Hive table data). Sentry is designed to be a pluggable authorization engine for Hadoop components. It allows you to define authorization rules to validate a user or application’s access requests for Hadoop resources. Sentry is highly modular and can support authorization for a wide variety of data models in Hadoop.
  • Previous
  • You're on page 1
  • Next