Search Results
                    
                    
            https://dev.mysql.com/doc/refman/8.4/en/windows-pluggable-authentication.html
                                To refer to the Windows authentication plugin in the IDENTIFIED WITH clause of a CREATE USER statement, use the name authentication_windows. To set this up, create a MySQL account named sql_admin that uses the Windows plugin for authentication: ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/audit-log-file-formats.html
                                For example, Create DB and Change user correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. For example, "Create DB" and "Change user" correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. <AUDIT_RECORD> ... The MySQL server calls ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-user.html
                                20.6.3.1.1 Replication User With The Caching SHA-2 Authentication Plugin By default, users created in MySQL 8 use Section 8.4.1.2, “Caching SHA-2 Pluggable Authentication”. 20.6.3.1.2 Replication User With SSL A replication user that requires an ... State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/connection-access.html
                                Account locking can be set or changed with the CREATE USER or ALTER USER statement. The server performs identity and credentials checking using columns in the user table, accepting the connection only if these conditions are satisfied: The client ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/group-replication-user-credentials.html
                                The process of creating the replication user for distributed recovery can be captured in the binary log, and then you can rely on distributed recovery to replicate the statements used to create the user. Alternatively, you can disable binary logging ...You must therefore set up a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
                                            
                https://dev.mysql.com/doc/mysql-monitor/8.0/en/glossary.html
                                A access control MySQL Enterprise Monitor Access Control enables you to manage asset visibility, application administration, data access, roles, and users. Based on your organization's particular needs, you may create or adapt custom advisors. Asset ... These terms are commonly used in information about MySQL Enterprise ...
                                            
                https://dev.mysql.com/doc/workbench/en/wb-mysql-connections-navigator-management-users-and-privileges.html
                                Login Tab The Login tab provides the following information related to the selected user account: Login Name: You may create multiple accounts with the same name to connect from different hosts.  The Administration - Users and Privileges tab provides ...The caching_sha2_password and SHA256_Password authentication types provide more secure password encryption than the Standard authentication ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/pluggable-authentication-system-variables.html
                                (The SPN and same key also must be created in the Kerberos server.) The file may contain multiple service principal names and their respective key combinations. The client-side authentication_ldap_sasl_client plugin communicates with the SASL ...The ...
                                            
                https://dev.mysql.com/doc/heatwave/en/mys-hwaml-using-a-recommendation-model-items-to-users.html
                                The following example runs ML_PREDICT_TABLE on the testing dataset previously created and sets the topk parameter to 2, so only two users are recommended.  This topic describes how to generate recommended users for items. For known users and known ...Set remove_seen to false to repeat existing interactions from the training ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/user-names.html
                                Thereafter, you normally set up, modify, and remove MySQL accounts using statements such as CREATE USER, DROP USER, GRANT, and REVOKE.  MySQL stores accounts in the user table of the mysql system database. An account is defined in terms of a user ...