3. Security3. Security 3.1. Coordinator Kerberos Authentication3.2. CLI Kerberos Authentication3.3. LDAP Authentication3.4. Java Keystores and Truststores3.5. Built-in System Access Control3.6. Secure Internal Communication3.7. Authorization