Search



Search Results
Displaying 251 to 260 of 3428 total results
https://dev.mysql.com/doc/refman/8.4/en/password-security-user.html
Passwords can be written as plain text in SQL statements such as CREATE USER and ALTER USER, so if you use these statements, they are logged in the history file. MySQL users should use the following guidelines to keep passwords secure. When you run ...The methods you can use to specify your password when you run client programs are listed here, along with an assessment of the risks of each ...
https://dev.mysql.com/doc/refman/8.4/en/account-names.html
MySQL account names consist of a user name and a host name, which enables creation of distinct accounts for users with the same user name who connect from different hosts. Account names appear in SQL statements such as CREATE USER, GRANT, and SET ...An account name consisting only of a user name is equivalent to ...This section describes the ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-filtering.html
It is theoretically possible for a user with sufficient permissions to mistakenly create an “abort” item in the audit log filter that prevents themselves and other administrators from accessing the system. Accounts created with the SYSTEM_USER ...Multiple filters can be defined, and any given filter can be assigned to any number of user ... Note For audit log filtering to work as ...
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-user-group-management.html
User and Group Management 20 User and Group Management MySQL HeatWave on AWS uses predefined OCI IAM groups and policies to manage access to the MySQL HeatWave Console. Predefined groups and policies are created when the service is provisioned. An ...Defining your own groups and policies for MySQL HeatWave on AWS is currently not ...
https://dev.mysql.com/doc/internals/en/user-level-locks.html
User-level locks are controlled with the SQL functions GET_LOCK(str,timeout) IS_FREE_LOCK(str) IS_USED_LOCK(str) RELEASE_LOCK(str) They can be used at places where SQL statements accept SQL functions. Nevertheless, a couple of synchronization ...
https://dev.mysql.com/doc/refman/8.4/en/request-access.html
These privileges can come from any of the user, global_grants, db, tables_priv, columns_priv, or procs_priv tables. (You may find it helpful to refer to Section 8.2.3, “Grant Tables”, which lists the columns present in each grant table.) The ...
https://dev.mysql.com/doc/refman/8.4/en/socket-pluggable-authentication.html
The authentication_string value can be specified using an IDENTIFIED ...AS clause with CREATE USER or ALTER USER. The plugin uses the SO_PEERCRED socket option to obtain information about the user running the client program. To uninstall it, use ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-existing-users.html
The MySQL user: For Agents to report the status of a MySQL server, they connect to a MySQL user with privileges to read required data on that server: SHOW DATABASES, REPLICATION CLIENT, SUPER, CREATE, and SELECT. For details about this account, see ...If you already have such a user on a MySQL server, specify its credentials when installing the Agent for that ...
https://dev.mysql.com/doc/refman/8.4/en/mysqldump.html
To reload a dump file, you must have the privileges required to execute the statements that it contains, such as the appropriate CREATE privileges for objects created by those statements. Note A dump made using PowerShell on Windows with output ...
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-remote.html
Use this option if you do not want to remove existing user-created data (schemas, tables, tablespaces) and binary logs from the recipient data directory. When the optional DATA DIRECTORY [=] 'clone_dir' clause is not used, a cloning operation ...
Displaying 251 to 260 of 3428 total results