Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-options-reference.html
log_bin_trust_function_creators: If equal to 0 (default), then when --log-bin is used, stored function creation is allowed only to users having SUPER privilege and only if function created does not break binary logging. report_password: Arbitrary ...
https://dev.mysql.com/doc/refman/8.4/en/select-into.html
For the INTO var_list variant: var_list names a list of one or more variables, each of which can be a user-defined variable, stored procedure or function parameter, or stored program local variable. INTO var_list statement, only user-defined ...INTO ...
https://dev.mysql.com/doc/refman/8.4/en/sha256-pluggable-authentication.html
MySQL provides two authentication plugins that implement SHA-256 hashing for user account passwords: caching_sha2_password: Implements SHA-256 authentication (like sha256_password), but uses caching on the server side for better performance and has ...For information about the caching plugin, see Section 8.4.1.2, “Caching SHA-2 Pluggable ...
https://dev.mysql.com/doc/refman/8.4/en/signal.html
To signal a generic SQLSTATE value, use '45000', which means “unhandled user-defined exception.” The SIGNAL statement optionally includes a SET clause that contains multiple signal items, in a list of condition_information_item_name = ...SIGNAL ...
https://dev.mysql.com/doc/refman/8.4/en/string-functions-charset.html
MySQL has many operators and functions that return a string. This section answers the question: What is the character set and collation of such a string? For simple functions that take string input and return a string result as output, the output's ...
https://dev.mysql.com/doc/refman/8.4/en/using-encrypted-connections.html
Suppose that you want to connect using an account that has no special encryption requirements or that was created using a CREATE USER statement that included the REQUIRE SSL clause. For additional information about the REQUIRE clause, see Section ...
https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-install-tarball.html
In the second of these lines, replace the placeholder @@MCMD_USER@@ with the name of the system user that runs the MySQL Cluster Manager agent (note that this must not be the system root account). Extract the MySQL Cluster Manager 8.4.6 program and ...
https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-reset.html
reset [--sequential-restart] filter_specification_list cluster_name filter_specification_list: filter_specification[,filter_specification][,...] filter_specification: attribute_name[:process_specification][+process_specification]] ...
https://dev.mysql.com/doc/extending-mysql/8.4/en/writing-authentication-plugins.html
Authentication plugins enable the use of authentication methods other than the built-in method of passwords stored in the mysql.user system table. Also, authentication plugins can support the proxy user capability, such that the connecting user is a ... MySQL supports pluggable authentication, in which plugins are invoked to authenticate client ...
https://dev.mysql.com/doc/mysql-router/9.4/en/mysql-router-configuration-file-syntax.html
For example, the user option's meaning depends on its associated section. A user in the [DEFAULT] section refers to the system user that MySQL Router is run as, which is also controlled by the --user command line option. Unrelated to that is ... The ...