Search Results
https://dev.mysql.com/doc/extending-mysql/8.4/en/writing-authentication-plugins-proxy-users.html
Use the CREATE USER or GRANT statement to associate accounts with plugins. This string comes from the AS part of the IDENTIFIED WITH clause of the CREATE USER statement that specifies use of the plugin for authentication. For example: CREATE USER ...
https://dev.mysql.com/doc/refman/8.4/en/windows-pluggable-authentication.html
To refer to the Windows authentication plugin in the IDENTIFIED WITH clause of a CREATE USER statement, use the name authentication_windows. To set this up, create a MySQL account named sql_admin that uses the Windows plugin for authentication: ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-file-formats.html
For example, Create DB and Change user correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. For example, "Create DB" and "Change user" correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. <AUDIT_RECORD> ... The MySQL server calls ...
https://dev.mysql.com/doc/refman/8.4/en/connection-access.html
Account locking can be set or changed with the CREATE USER or ALTER USER statement. The server performs identity and credentials checking using columns in the user table, accepting the connection only if these conditions are satisfied: The client ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-user.html
20.6.3.1.1 Replication User With The Caching SHA-2 Authentication Plugin By default, users created in MySQL 8 use Section 8.4.1.2, “Caching SHA-2 Pluggable Authentication”. 20.6.3.1.2 Replication User With SSL A replication user that requires an ... State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-user-credentials.html
The process of creating the replication user for distributed recovery can be captured in the binary log, and then you can rely on distributed recovery to replicate the statements used to create the user. Alternatively, you can disable binary logging ...You must therefore set up a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/glossary.html
A access control MySQL Enterprise Monitor Access Control enables you to manage asset visibility, application administration, data access, roles, and users. Based on your organization's particular needs, you may create or adapt custom advisors. Asset ... These terms are commonly used in information about MySQL Enterprise ...
https://dev.mysql.com/doc/workbench/en/wb-mysql-connections-navigator-management-users-and-privileges.html
Login Tab The Login tab provides the following information related to the selected user account: Login Name: You may create multiple accounts with the same name to connect from different hosts. The Administration - Users and Privileges tab provides ...The caching_sha2_password and SHA256_Password authentication types provide more secure password encryption than the Standard authentication ...
https://dev.mysql.com/doc/refman/8.4/en/pluggable-authentication-system-variables.html
(The SPN and same key also must be created in the Kerberos server.) The file may contain multiple service principal names and their respective key combinations. The client-side authentication_ldap_sasl_client plugin communicates with the SASL ...The ...
https://dev.mysql.com/doc/refman/8.4/en/webauthn-pluggable-authentication.html
Create a multifactor account using a statement like this: CREATE USER 'u2'@'localhost' IDENTIFIED WITH caching_sha2_password BY 'sha2_password' AND IDENTIFIED WITH authentication_webauthn; To connect, supply the factor 1 password to satisfy ...MySQL ... Note WebAuthn authentication is an extension included in MySQL Enterprise Edition, a commercial ...