Hello Aneela,

You can refer to this page for instructions on hadoop impersonation :
http://hadoopsecurity.org/wiki/HowToImpersonate

thanks,
Benoy

On Thu, Jun 23, 2016 at 1:15 PM, Chris Nauroth <[EMAIL PROTECTED]>
wrote: