Search Results
                    
                    
            https://dev.mysql.com/doc/refman/8.4/en/checking-gpg-signature.html
                                To verify the signature for a specific package, you first need to obtain a copy of our public GPG build key, which you can download from http://pgp.mit.edu/. The keyID for MySQL 8.0.44 packages and higher, MySQL 8.4.7 and higher, and MySQL 9.5.0 and ... Another method of verifying the integrity and authenticity of a package is to use cryptographic ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/keyring-service.html
                                 MySQL Server supports a keyring service that enables internal components and plugins to securely store sensitive information for later retrieval. MySQL distributions provide a keyring interface that is accessible at two levels: At the SQL level, as ...As a C language interface, callable as a plugin service from server plugins or loadable ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/using-encrypted-connections.html
                                 Several configuration parameters are available to indicate whether to use encrypted connections, and to specify the appropriate certificate and key files. Instructions for creating any required certificate and key files are available in Section ...
                                            
                https://dev.mysql.com/doc/heatwave/en/mys-hwaml-how-to-import-onnx.html
                                The table that you load the model into must have the following columns: chunk_id: The recommended parameters are INT AUTO_INCREMENT PRIMARY KEY. $> scp -v -i ssh-key.key /Users/user1/iris_base64.onnx opc@ComputeInstancePublicIP:/home/opc/ Replace ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/connection-options.html
                                Command Options for Encrypted Connections This section describes options for client programs that specify whether to use encrypted connections to the server, the names of certificate and key files, and other parameters related to ... This section ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-replication-conflict-resolution.html
                                NBT_UPDATED_ONLY_MINIMAL and NBT_UPDATED_FULL_MINIMAL can be used with NDB$EPOCH(), NDB$EPOCH2(), and NDB$EPOCH_TRANS(), because these do not require “before” values of columns which are not primary keys. This function has no effects on ...
                                            
                https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-how-to-import-onnx.html
                                The table that you load the model into must have the following columns: chunk_id: The recommended parameters are INT AUTO_INCREMENT PRIMARY KEY. $> scp -v -i ssh-key.key /Users/user1/iris_base64.onnx user1@ComputeInstancePublicIP:/home/user1/ ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/server-status-variables.html
                                The optional GLOBAL keyword aggregates the values over all connections, and SESSION shows the values for the current connection. Caching_sha2_password_rsa_public_key The public key used by the caching_sha2_password authentication plugin for RSA key ... The MySQL server maintains many status variables that provide information about its ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/mysql-command-options.html
                                --otel_exporter_otlp_traces_compression Compression type --otel_exporter_otlp_traces_endpoint The trace export endpoint --otel_exporter_otlp_traces_headers Key-value pairs to be used as headers associated with HTTP requests ... mysql supports the ...
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-connect.html
                                The second method uses RSA key pair-based password exchange over an unencrypted connection. The procedures also assume that you have distributed client certificate and key files to the remote clients as described in Distributing Client Certificate ...The first method uses the TLS (Transport Layer Security) protocol to establish an encrypted ...