Search Results
https://dev.mysql.com/doc/extending-mysql/8.4/en/plugin-types.html
That terminology was something of a misnomer because “user-defined” also can apply to stored functions written using SQL and native functions added by modifying the server source code. INFORMATION_SCHEMA Plugins INFORMATION_SCHEMA plugins enable ... The plugin API enables creation of plugins that implement several capabilities: Loadable functions (UDFs) Storage engines Full-text parsers Daemons INFORMATION_SCHEMA tables Semisynchronous replication Auditing Authentication Password validation and strength checking Protocol tracing Query rewriting Secure keyring storage and retrieval The following sections provide an overview of these plugin ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-user-roles.html
Before installing MySQL Enterprise Monitor, gather credentials (a root user ID and password) for all the MySQL servers you plan to monitor. MySQL Enterprise Monitor Agent installation requires a dedicated user in each monitored MySQL server, and ...
https://dev.mysql.com/doc/workbench/en/wb-model-overview-privileges.html
The Schema Privileges panel has the following sections, used to create users for your schemas and to define roles: Users Roles The following figure displays the Schema Privileges section of the MySQL Model tab. Figure 9.7 Roles and Privileges ...
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-mysql-enterprise-audit.html
Granting Audit Administration Privileges By default, the administrator user you defined while creating the DB system has the audit administration privileges. You can grant the privileges to more users (for example, to the user User001) by running ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-administrable-role-authorizations-table.html
The ADMINISTRABLE_ROLE_AUTHORIZATIONS table provides information about which roles applicable for the current user or role can be granted to other users or roles. GRANTEE The user name part of the account to which the role is granted. The ...
https://dev.mysql.com/doc/heatwave/en/mys-hw-genai-privileges.html
mysql> GRANT SELECT, INSERT, CREATE, DROP, ALTER, UPDATE ON output_schema.* TO 'user_name'@'%'; For more information, see Privileges Provided by MySQL and Default MySQL Privileges. What's Next Learn about the available LLMs, embedding Models, and ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-connection-security.html
Using the MySQL protocol means that standard methods of user authentication can be used for granting (or revoking) access to the group in place of the allowlist, and the latest functionality of the server’s protocol is always available on release.
https://dev.mysql.com/doc/x-devapi-userguide/en/error-handling.html
When writing scripts for MySQL Shell you can often simply rely on the exception handling done by MySQL Shell. For all other languages either proper exception handling is required to catch errors or the traditional error handling pattern needs to be ...
https://dev.mysql.com/doc/x-devapi-userguide/en/transaction-handling.html
Transactions can be used to group operations into an atomic unit. Either all operations of a transaction succeed when they are committed, or none. It is possible to roll back a transaction as long as it has not been committed. Transactions can be ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-first-login-dashboard.html
The user defined here is added to the default manager role. This creates the Manager user described in Section 4.3.3, “Users Created on First Log-in”. Record the user name and password, as these credentials are required for any future login. For ...