User authentication
Identity authentication is the cornerstone of database security protection: only authenticated users are allowed to operate databases. On the other hand, databases can also check the user's identity to determine whether the current operation has been authorized or not.
As the distributed database succeeds the centralized Database Management System (DBMS), user authentication is facing new challenges.
This section will help you understand the authentication mechanism of distributed databases and related features of Apache ShardingSphere.
Authentication of DBMS versus distributed database
The following section introduces you to user ID storage and the differences in its implementation between a DBMS and a distributed database. You might already be familiar with DBMS user ID storage as it's the most widespread, which makes this distinction even more important for you to understand before moving forward.
First, we will start with...