Search Results
https://dev.mysql.com/doc/connectors/en/connecting-using-kerberos.html
Kerberos Authentication Workflow The main usage of Kerberos authentication in MySQL is to allow users to create connections without having to specify a user name and password in the connection string. For that to work, Connector/J must be configured ... Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions ...
https://dev.mysql.com/doc/connectors/en/connector-net-authentication.html
For example, with GSSAPI you can set the ticket-granting ticket (TGT) expiry time, key distribution center (KDC) port, and so on. For specific details about usage and support, see SDK and CLI Configuration File. MySQL Connector/NET implements a ...
https://dev.mysql.com/doc/connector-net/en/connector-net-authentication.html
For example, with GSSAPI you can set the ticket-granting ticket (TGT) expiry time, key distribution center (KDC) port, and so on. For specific details about usage and support, see SDK and CLI Configuration File. MySQL Connector/NET implements a ...
https://dev.mysql.com/doc/heatwave/en/mys-hw-excluded-columns.html
These columns are typically not needed for analytic queries and are therefore omitted to optimize memory usage and performance. If not, ask your admin user to grant you the required privileges. In MySQL HeatWave, you can explicitly exclude certain ...
https://dev.mysql.com/doc/connector-j/en/connecting-using-kerberos.html
Kerberos Authentication Workflow The main usage of Kerberos authentication in MySQL is to allow users to create connections without having to specify a user name and password in the connection string. For that to work, Connector/J must be configured ... Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions ...
https://dev.mysql.com/doc/refman/8.4/en/drop-role.html
A dropped role is automatically revoked from any user account (or role) to which the role was granted. DROP ROLE removes one or more roles (named collections of privileges). To use this statement, you must have the global DROP ROLE or CREATE USER ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-innodb-tablestats-table.html
For related usage information and examples, see Section 17.15.3, “InnoDB INFORMATION_SCHEMA Schema Object Tables”. The rate at which the AUTOINC value changes depends on how many times auto-increment numbers have been requested and how many ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-read-only-instance.html
For example, CREATE USER, GRANT, REVOKE, and INSTALL PLUGIN operations are not permitted in read-only mode. Usage Scenarios This mode of operation is appropriate in situations such as: Distributing a MySQL application, or a set of MySQL data, on a ... You can query InnoDB tables where the MySQL data directory is on read-only media by enabling the --innodb-read-only configuration option at server ...
https://dev.mysql.com/doc/refman/8.4/en/mysqld-safe.html
This is intended to prevent excessive CPU usage in the event of repeated failures. mysqld_safe is the recommended way to start a mysqld server on Unix. mysqld_safe adds some safety features such as restarting the server when an error occurs and ...
https://dev.mysql.com/doc/refman/8.4/en/test-pluggable-authentication.html
MySQL includes a test plugin that checks account credentials and logs success or failure to the server error log. This is a loadable plugin (not built in) and must be installed prior to use. The test plugin source code is separate from the server ...