Search Results
https://dev.mysql.com/doc/refman/8.4/en/checking-gpg-signature.html
Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This is more reliable than using MD5 checksums, but requires more work. GnuPG is an Open Source alternative to the well-known Pretty Good ...
https://dev.mysql.com/doc/refman/8.4/en/checking-rpm-signature.html
Rather, RPM maintains a separate keyring because it is a system-wide application and a user's GPG public keyring is a user-specific file. RPM 4.1 no longer uses your personal GPG keyring (or GPG itself). To import the MySQL public key into the RPM ...
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-replication.html
SOURCE_LOG_FILE = 'source_log_name', SOURCE_LOG_POS = source_log_pos, FOR CHANNEL 'setup_channel'; START REPLICA USER = 'user_name' PASSWORD = 'password' FOR CHANNEL 'setup_channel'; . In addition to cloning data, a cloning operation extracts ...
https://dev.mysql.com/doc/refman/8.4/en/execute.html
If the prepared statement contains any parameter markers, you must supply a USING clause that lists user variables containing the values to be bound to the parameters. Parameter values can be supplied only by user variables, and the USING clause ...
https://dev.mysql.com/doc/refman/8.4/en/faqs-information-schema.html
You may also find the MySQL User Forums to be helpful. Is there a discussion forum for INFORMATION_SCHEMA? See the MySQL User Forums. Where can I find documentation for the MySQL INFORMATION_SCHEMA database? A.7.2. Where can I find the ANSI SQL 2003 ...
https://dev.mysql.com/doc/refman/8.4/en/faqs-security.html
Where can I find documentation that addresses security issues for MySQL? A.9.2. Is SSL support built into MySQL binaries, or must I recompile the binary myself to enable it? A.9.5. Does MySQL include support for Roles Based Access Control (RBAC)? ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-distributed-recovery-securing.html
To secure distributed recovery connections in the group, ensure that user credentials for the replication user are properly secured, and use SSL for distributed recovery connections if possible. Important When using the MySQL communication stack ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-connection-control-failed-login-attempts-table.html
This table provides information about the current number of consecutive failed connection attempts per account (user/host combination). CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTS has these columns: USERHOST The user/host combination indicating an ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-resource-groups-table.html
User resource groups have a priority that ranges from 0 to 19. The RESOURCE_GROUPS table provides access to information about resource groups. For general discussion of the resource group capability, see Section 7.1.16, “Resource Groups”. You ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-role-column-grants-table.html
The ROLE_COLUMN_GRANTS table has these columns: GRANTOR The user name part of the account that granted the role. GRANTEE The user name part of the account to which the role is granted. The ROLE_COLUMN_GRANTS table provides information about the ...