Search Results
https://dev.mysql.com/doc/extending-mysql/8.4/en/writing-authentication-plugins-proxy-users.html
Use the CREATE USER or GRANT statement to associate accounts with plugins. This string comes from the AS part of the IDENTIFIED WITH clause of the CREATE USER statement that specifies use of the plugin for authentication. For example: CREATE USER ...
https://dev.mysql.com/doc/refman/8.4/en/windows-pluggable-authentication.html
To refer to the Windows authentication plugin in the IDENTIFIED WITH clause of a CREATE USER statement, use the name authentication_windows. To set this up, create a MySQL account named sql_admin that uses the Windows plugin for authentication: ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-user.html
20.6.3.1.1 Replication User With The Caching SHA-2 Authentication Plugin By default, users created in MySQL 8 use Section 8.4.1.2, “Caching SHA-2 Pluggable Authentication”. 20.6.3.1.2 Replication User With SSL A replication user that requires an ... State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-file-formats.html
For example, Create DB and Change user correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. For example, "Create DB" and "Change user" correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. <AUDIT_RECORD> ... The MySQL server calls ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-user-credentials.html
The process of creating the replication user for distributed recovery can be captured in the binary log, and then you can rely on distributed recovery to replicate the statements used to create the user. Alternatively, you can disable binary logging ...You must therefore set up a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/refman/8.4/en/connection-access.html
Account locking can be set or changed with the CREATE USER or ALTER USER statement. The server performs identity and credentials checking using columns in the user table, accepting the connection only if these conditions are satisfied: The client ...
https://dev.mysql.com/doc/workbench/en/wb-mysql-connections-navigator-management-users-and-privileges.html
Login Tab The Login tab provides the following information related to the selected user account: Login Name: You may create multiple accounts with the same name to connect from different hosts. The Administration - Users and Privileges tab provides ...The caching_sha2_password and SHA256_Password authentication types provide more secure password encryption than the Standard authentication ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-using-a-recommendation-model-items-to-users.html
The following example runs ML_PREDICT_TABLE on the testing dataset previously created and sets the topk parameter to 2, so only two users are recommended. This topic describes how to generate recommended users for items. For known users and known ...Set remove_seen to false to repeat existing interactions from the training ...
https://dev.mysql.com/doc/refman/8.4/en/user-names.html
Thereafter, you normally set up, modify, and remove MySQL accounts using statements such as CREATE USER, DROP USER, GRANT, and REVOKE. MySQL stores accounts in the user table of the mysql system database. An account is defined in terms of a user ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-using-a-recommendation-model-similar-users.html
The following example runs ML_PREDICT_TABLE on the testing dataset previously created and sets the topk parameter to 2, so only two similar users are generated. This topic describes how to generate recommendations for similar users. For known ...