Search Results
https://dev.mysql.com/doc/connectors/en/connector-net-authentication.html
MySQL Connector/NET implements a variety of authentication plugins that MySQL Server can invoke to authenticate a user. Pluggable authentication enables the server to determine which plugin applies, based on the user name and host name that your ...
https://dev.mysql.com/doc/connector-net/en/connector-net-authentication.html
MySQL Connector/NET implements a variety of authentication plugins that MySQL Server can invoke to authenticate a user. Pluggable authentication enables the server to determine which plugin applies, based on the user name and host name that your ...
https://dev.mysql.com/doc/refman/8.4/en/alter-user.html
The exceptions are: Any client who connects to the server using a nonanonymous account can change the password for that account. When the read_only system variable is enabled, ALTER USER additionally requires the CONNECTION_ADMIN privilege (or the ... ALTER USER [IF EXISTS] user [auth_option] [, user [auth_option]] ...
https://dev.mysql.com/doc/refman/8.4/en/pam-pluggable-authentication.html
PAM pluggable authentication provides these capabilities: External authentication: PAM authentication enables MySQL Server to accept connections from users defined outside the MySQL grant tables and that authenticate using methods supported by PAM.
https://dev.mysql.com/doc/refman/8.4/en/proxy-users.html
The plugin that authenticates a given connection may request that the connecting (external) user be treated as a different user for privilege-checking purposes. For a client connecting to the proxy account to be treated as a proxy user, the ...This ...
https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-using-start-client.html
This section covers starting the MySQL Cluster Manager client and connecting to the MySQL Cluster Manager agent. You can connect to any MySQL Cluster Manager agent with an mcm client on any platform where it is available. This means, for example, ...MySQL Cluster Manager 8.4.6 includes a command-line client mcm, located in the installation bin ...
https://dev.mysql.com/doc/mysql-shell/9.4/en/mysql-shell-commands.html
MySQL Shell provides commands which enable you to modify the execution environment of the code editor, for example to configure the active programming language or a MySQL Server connection. Connect, Reconnect, and Disconnect Commands The \connect ...The following table lists the commands that are available regardless of the currently selected ...
https://dev.mysql.com/doc/internals/en/user-level-locks.html
send SELECT GET_LOCK("mysqltest1", 10); --connection conn2 # Wait for INSERT to timeout. User-level locks are controlled with the SQL functions GET_LOCK(str,timeout) IS_FREE_LOCK(str) IS_USED_LOCK(str) RELEASE_LOCK(str) They can be used at places ...Depending on their appearance in the select list, the where clause, the group by clause, etc, of select, update or other statements, these statements can be blocked at different code ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-ui-settings-external-auth-ref.html
Connect Timeout (seconds) Time elapsed without establishing a connection to the LDAP server. You must change this option to the port used for SSL connections if you have enabled encryption. You must change this option to the port used for SSL ...
https://dev.mysql.com/doc/refman/8.4/en/privileges-provided.html
Grant this privilege to accounts that are used by replicas to connect to the current server as their replication source server. Enables control over client connections not permitted to non-SUPER accounts: Enables use of the KILL statement or ... The ...