Search

Download this Manual
PDF (US Ltr) - 35.0Mb
PDF (A4) - 35.1Mb
Man Pages (TGZ) - 254.9Kb
Man Pages (Zip) - 359.9Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 171 to 180 of 687 total results
https://dev.mysql.com/doc/refman/5.7/en/view-restrictions.html
If a user is granted the basic privileges necessary to create a view (the CREATE VIEW and SELECT privileges), that user cannot call SHOW CREATE VIEW on that object unless the user is also granted the SHOW VIEW privilege. The workaround to the ...
https://dev.mysql.com/doc/refman/5.7/en/implicit-commit.html
ALTER USER, CREATE USER, DROP USER, GRANT, RENAME USER, REVOKE, SET PASSWORD. This means that a ROLLBACK from the user does not undo CREATE TABLE statements the user made during that transaction. The statements listed in this section (and any ...
https://dev.mysql.com/doc/refman/5.7/en/installing-source-distribution.html
Then perform the following steps as the mysql user, except as noted. Note The accounts that are listed in the MySQL grant tables initially have no passwords. To install MySQL from a standard source distribution: Verify that your system satisfies ...
https://dev.mysql.com/doc/refman/5.7/en/replication-options-reference.html
log_bin_trust_function_creators: If equal to 0 (default), then when --log-bin is used, stored function creation is allowed only to users having SUPER privilege and only if function created does not break binary logging. report_password: Arbitrary ...
https://dev.mysql.com/doc/refman/5.7/en/replication-encrypted-connections.html
If you want to ensure that the source only accepts replicas that connect using encrypted connections, create a replication user account on the source using the REQUIRE SSL option, then grant that user the REPLICATION SLAVE privilege. For example: ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-installation.html
As of MySQL 5.7.23, for new MySQL installations, the USER and HOST columns in the audit_log_user table used by MySQL Enterprise Audit have definitions that better correspond to the definitions of the User and Host columns in the mysql.user system ...
https://dev.mysql.com/doc/refman/5.7/en/caching-sha2-pluggable-authentication.html
MySQL provides two authentication plugins that implement SHA-256 hashing for user account passwords: sha256_password: Implements basic SHA-256 authentication. The caching_sha2_password plugin has these advantages, compared to sha256_password: On ...
https://dev.mysql.com/doc/refman/5.7/en/entering-queries.html
If you decide you do not want to execute a query that you are in the process of entering, cancel it by typing \c: mysql> SELECT -> USER() -> \c mysql> Here, too, notice the prompt. In this case, mysql waits for more input: mysql> SELECT USER() -> If ... Make sure that you are connected to the server, as discussed in the previous ...
https://dev.mysql.com/doc/refman/5.7/en/environment-variables.html
USER The default user name on Windows when connecting to mysqld. This section lists environment variables that are used directly or indirectly by MySQL. Most of these can also be found in other places in this manual. Options on the command line ...
https://dev.mysql.com/doc/refman/5.7/en/events-overview.html
Users can create, modify, and drop scheduled events using SQL statements intended for these purposes. A user may include statements in an event's action which require privileges that the user does not actually have. The default definer of an event ... MySQL Events are tasks that run according to a ...
Displaying 171 to 180 of 687 total results