Database Reference
In-Depth Information
External authentication . External authentications, such as Kerberos, are
network protocols to authenticate a client's identity using a ticketing
system.
Client-server encryption . Client-to-server or node-to-node encryption is
another way by which data can be transferred across the cluster. With
encryption, clients' or nodes' public trust certification has to be installed
on another node.
The authentication process is limited to user verification and identification.
Processing user access control is known as authorization. Database authorization
means managing a user's role and privileges to schema, tables, and columns.
Cassandra's internal authentication is an SSL-encryption mechanism that we'll
look at in the form of practical recipes.
system and system_auth Keyspaces
The system keyspace contains information about available column families, columns,
and clusters. The system_auth keyspace mainly contains authentication information,
user credentials, and permissions. We will discuss them in upcoming recipes. Table/
column families under the system keyspace are:
schema_keyspace
schema_columns
schema_columnfamilies
local
peers
Figure 4-1 shows the system keyspace hierarchy, where the root node is the
system keyspace, subordinate nodes are column families, and each table represents
columns defined with those column families.
 
Search WWH ::




Custom Search