Search Results
https://dev.mysql.com/doc/connector-j/en/connector-j-connp-props-networking.html
socksProxyHost Name or IP address of a SOCKS host to connect through. Default Value 1080 Since Version 5.1.34 socketFactory The name of the class that the driver should use for creating socket connections to the server. This class must implement ...
https://dev.mysql.com/doc/connector-j/en/connector-j-reference-configuration-properties.html
Configuration properties define how Connector/J will make a connection to a MySQL server. Unless otherwise noted, properties can be set for a DataSource object or for a Connection object. If you specify a configuration property in the URL without ...
https://dev.mysql.com/doc/refman/8.4/en/adding-collation.html
Additional Resources Example showing how to add a collation for full-text searches: Section 14.9.7, “Adding a User-Defined Collation for Full-Text Indexing” The Unicode Collation Algorithm (UCA) specification: ... Warning User-defined collations ...
https://dev.mysql.com/doc/refman/8.4/en/alter-view.html
ALTER [ALGORITHM = {UNDEFINED | MERGE | TEMPTABLE}] [DEFINER = user] [SQL SECURITY { DEFINER | INVOKER }] VIEW view_name [(column_list)] AS select_statement [WITH [CASCADED | LOCAL] CHECK OPTION] This statement changes the definition of a view, ...
https://dev.mysql.com/doc/refman/8.4/en/caching-sha2-pluggable-authentication.html
In the name caching_sha2_password, “sha2” refers more generally to the SHA-2 class of encryption algorithms, of which 256-bit encryption is one instance. MySQL provides two authentication plugins that implement SHA-256 hashing for user account ...
https://dev.mysql.com/doc/refman/8.4/en/charset-collation-implementations.html
Collations for Unicode multibyte character sets Some of these collations are based on the Unicode Collation Algorithm (UCA), others are not. MySQL implements several types of collations: Simple collations for 8-bit character sets This kind of ...
https://dev.mysql.com/doc/refman/8.4/en/charset-conversion.html
Note ALTER TABLE statements which make changes in table or column character sets or collations must be performed using ALGORITHM=COPY. To convert a binary or nonbinary string column to use a particular character set, use ALTER TABLE. For successful ...
https://dev.mysql.com/doc/refman/8.4/en/create-user.html
Encryption can be weak if old algorithms using short encryption keys are used. CREATE USER [IF NOT EXISTS] user [auth_option] [, user [auth_option]] ... [REQUIRE {NONE | tls_option [[AND] tls_option] ...}] [WITH resource_option [resource_option] ...
https://dev.mysql.com/doc/refman/8.4/en/creating-ssl-rsa-files-using-mysql.html
The SSL server and client certificates are signed with the CA certificate and key, using the sha256WithRSAEncryption signature algorithm. MySQL provides these ways to create the SSL certificate and key files and RSA key-pair files required to ...
https://dev.mysql.com/doc/refman/8.4/en/engine-condition-pushdown-optimization.html
Join algorithms cannot be combined with referring columns from previous tables in the following two situations: When any of the referred previous tables are in a join buffer. This optimization improves the efficiency of direct comparisons between a ...