Search



Search Results
Displaying 701 to 710 of 1104 total results
https://dev.mysql.com/doc/connector-j/en/connector-j-reference-jdbc-url-format.html
This section explains the syntax of the URLs for connecting to MySQL. This is the generic format of the connection URL: protocol//[hosts][/database][?properties] The URL consists of the following parts: Important Any reserved characters for URLs ...
https://dev.mysql.com/doc/connector-j/en/connector-j-reference-using-ssl.html
The allowlist and blocklist of cipher suites apply to both JDBC and X DevAPI connections. Connector/J can encrypt all data communicated between the JDBC driver and the server (except for the initial handshake) using SSL. There is a performance ...
https://dev.mysql.com/doc/connector-j/en/connector-j-schema-validation.html
For the Validation object of a ModifyCollectionOptions object, users can set either its level or schema, or both. When working with MySQL Server 8.0.19 and later: Schema validation can be configured for a Collection, so that documents in the ...
https://dev.mysql.com/doc/connector-j/en/connector-j-server-authentication.html
If sslMode is not set, server authentication via server certificate verification is enabled when the legacy properties useSSL AND verifyServerCertificate are both true. Server authentication via server certificate verification is enabled when the ...
https://dev.mysql.com/doc/connector-j/en/connector-j-support-bug-report.html
Writing a good bug report takes patience, but doing it right the first time saves time both for us and for yourself. The normal place to report bugs is http://bugs.mysql.com/, which is the address for our bugs database. This database is public, and ...
https://dev.mysql.com/doc/connector-j/en/connector-j-time-instants.html
Background A time instant is a specific moment on a time-line. A time instant is said to be preserved when it always refers to the same point in time when its value is being stored to or retrieved from a database, no matter what time zones the ...
https://dev.mysql.com/doc/connector-j/en/connector-j-usagenotes-j2ee-concepts-connection-pooling.html
Sizing the Connection Pool Each connection to MySQL has overhead (memory, CPU, context switches, and so forth) on both the client and server side. Connection pooling is a technique of creating and managing a pool of connections that are ready for ...
https://dev.mysql.com/doc/connector-j/en/connector-j-using-mfa.html
password and password1 are taken as synonyms except when both are supplied, in which case password1 overrides password. Multifactor authentication (MFA) is the use of multiple authentication factors during an authentication process. When ...
https://dev.mysql.com/doc/refman/8.4/en/access-control.html
MySQL considers both your host name and user name in identifying you because there is no reason to assume that a given user name belongs to the same person on all hosts. MySQL enables the creation of accounts that permit client users to connect to ...
https://dev.mysql.com/doc/refman/8.4/en/account-names.html
For example, in the account name 'test-user'@'%.com', both the user name and host name parts require quotes. MySQL account names consist of a user name and a host name, which enables creation of distinct accounts for users with the same user name ...
Displaying 701 to 710 of 1104 total results