Search Results
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-security.html
Security 1.6 Security Oracle considers cloud security its highest priority. The following security features help keep your data safe and secure. Database access control and account management MySQL provides security features to control access and ...
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-viewing-tenancy-ocid.html
Viewing OCID of the Tenancy 21.4 Viewing OCID of the Tenancy Use the Oracle Cloud Infrastructure (OCI) Console to view and copy the OCID of the tenancy. Do the following to view and copy the OCID of the tenancy: Open the Oracle Cloud Infrastructure ...
https://dev.mysql.com/doc/connector-j/en/connecting-using-kerberos.html
Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions only) . Support for Kerberos is implemented by Connector/J using the GSS-API, JAAS API, and JCA API; providers for ...
https://dev.mysql.com/doc/connector-j/en/connector-j-reference-using-ssl.html
Connector/J can encrypt all data communicated between the JDBC driver and the server (except for the initial handshake) using SSL. There is a performance penalty for enabling connection encryption, the severity of which depends on multiple factors ...
https://dev.mysql.com/doc/refman/8.4/en/charset-unicode.html
The Unicode Standard includes characters from the Basic Multilingual Plane (BMP) and supplementary characters that lie outside the BMP. For information about the Unicode Standard itself, visit the Unicode Consortium website. BMP characters have ...
https://dev.mysql.com/doc/refman/8.4/en/charset-we-sets.html
Western European character sets cover most West European languages, such as French, Spanish, Catalan, Basque, Portuguese, Italian, Albanian, Dutch, German, Danish, Swedish, Norwegian, Finnish, Faroese, Icelandic, Irish, Scottish, and English. ascii ...
https://dev.mysql.com/doc/refman/8.4/en/checking-gpg-signature.html
Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This is more reliable than using MD5 checksums, but requires more work. GnuPG is an Open Source alternative to the well-known Pretty Good ...
https://dev.mysql.com/doc/refman/8.4/en/compilation-problems.html
If you do reconfigure, take note of the following: If CMake is run after it has previously been run, it may use information that was gathered during its previous invocation. When CMake starts, it looks for that file and reads its contents if it ...
https://dev.mysql.com/doc/refman/8.4/en/create-table-foreign-keys.html
MySQL supports foreign keys, which permit cross-referencing related data across tables, and foreign key constraints, which help keep the related data consistent. A foreign key relationship involves a parent table that holds the initial column ...
https://dev.mysql.com/doc/refman/8.4/en/create-table-ndb-comment-options.html
NDB_COLUMN Options NDB_TABLE Options It is possible to set a number of options specific to NDB Cluster in the table comment or column comments of an NDB table. Table-level options for controlling read from any replica and partition balance can be ...