Database Reference
In-Depth Information
•
External authentication
. External authentications, such as Kerberos, are
network protocols to authenticate a client's identity using a ticketing
system.
•
Client-server encryption
. Client-to-server or node-to-node encryption is
another way by which data can be transferred across the cluster. With
encryption, clients' or nodes' public trust certification has to be installed
on another node.
The authentication process is limited to user verification and identification.
Processing user access control is known as authorization. Database authorization
means managing a user's role and privileges to schema, tables, and columns.
Cassandra's internal authentication is an SSL-encryption mechanism that we'll
look at in the form of practical recipes.
system and system_auth Keyspaces
The
system
keyspace contains information about available column families, columns,
and clusters. The
system_auth
keyspace mainly contains authentication information,
user credentials, and permissions. We will discuss them in upcoming recipes. Table/
column families under the
system
keyspace are:
•
schema_keyspace
•
schema_columns
•
schema_columnfamilies
•
local
•
peers
system
keyspace, subordinate nodes are column families, and each table represents
columns defined with those column families.