Search



Search Results
Displaying 191 to 200 of 3428 total results
https://dev.mysql.com/doc/refman/8.4/en/windows-pluggable-authentication.html
To refer to the Windows authentication plugin in the IDENTIFIED WITH clause of a CREATE USER statement, use the name authentication_windows. To set this up, create a MySQL account named sql_admin that uses the Windows plugin for authentication: ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-file-formats.html
For example, Create DB and Change user correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. For example, "Create DB" and "Change user" correspond to COM_CREATE_DB and COM_CHANGE_USER, respectively. <AUDIT_RECORD> ... The MySQL server calls ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-user.html
20.6.3.1.1 Replication User With The Caching SHA-2 Authentication Plugin By default, users created in MySQL 8 use Section 8.4.1.2, “Caching SHA-2 Pluggable Authentication”. 20.6.3.1.2 Replication User With SSL A replication user that requires an ... State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/refman/8.4/en/connection-access.html
Account locking can be set or changed with the CREATE USER or ALTER USER statement. The server performs identity and credentials checking using columns in the user table, accepting the connection only if these conditions are satisfied: The client ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-user-credentials.html
The process of creating the replication user for distributed recovery can be captured in the binary log, and then you can rely on distributed recovery to replicate the statements used to create the user. Alternatively, you can disable binary logging ...You must therefore set up a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/glossary.html
A access control MySQL Enterprise Monitor Access Control enables you to manage asset visibility, application administration, data access, roles, and users. Based on your organization's particular needs, you may create or adapt custom advisors. Asset ... These terms are commonly used in information about MySQL Enterprise ...
https://dev.mysql.com/doc/workbench/en/wb-mysql-connections-navigator-management-users-and-privileges.html
Login Tab The Login tab provides the following information related to the selected user account: Login Name: You may create multiple accounts with the same name to connect from different hosts. The Administration - Users and Privileges tab provides ...The caching_sha2_password and SHA256_Password authentication types provide more secure password encryption than the Standard authentication ...
https://dev.mysql.com/doc/refman/8.4/en/pluggable-authentication-system-variables.html
(The SPN and same key also must be created in the Kerberos server.) The file may contain multiple service principal names and their respective key combinations. The client-side authentication_ldap_sasl_client plugin communicates with the SASL ...The ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-using-a-recommendation-model-items-to-users.html
The following example runs ML_PREDICT_TABLE on the testing dataset previously created and sets the topk parameter to 2, so only two users are recommended. This topic describes how to generate recommended users for items. For known users and known ...Set remove_seen to false to repeat existing interactions from the training ...
https://dev.mysql.com/doc/refman/8.4/en/user-names.html
Thereafter, you normally set up, modify, and remove MySQL accounts using statements such as CREATE USER, DROP USER, GRANT, and REVOKE. MySQL stores accounts in the user table of the mysql system database. An account is defined in terms of a user ...
Displaying 191 to 200 of 3428 total results