Search Results
https://dev.mysql.com/doc/workbench/en/wb-mysql-connections-secure-auth.html
Here are two scenarios: If the secure_auth MySQL Server option is disabled, then you can log in using the user with the old password format and update the user's own MySQL password. To upgrade the password, you can either disable secure_auth (not ...
https://dev.mysql.com/doc/connectors/en/connector-cpp-apps-windows-notes.html
That is, applications should use the same build mode and linker option, to ensure that the connector and the application use the same runtime library. The following table shows the linker option appropriate for each combination of build mode and ...
https://dev.mysql.com/doc/connectors/en/connector-net-installation-source.html
Building MySQL Connector/NET from the source code enables you to customize build parameters and target platforms such as Linux and macOS. The procedures in this section describe how to build source with Microsoft Visual Studio (Windows or macOS) ...
https://dev.mysql.com/doc/connectors/en/connectors-apis.html
Both Connectors and the APIs enable you to connect and execute MySQL statements from another language or environment, including ODBC, Java (JDBC), C++, Python, Node.js, PHP, Perl, Ruby, and C. Connector/J provides driver support for connecting to ...
https://dev.mysql.com/doc/connector-net/en/connector-net-installation-source.html
Building MySQL Connector/NET from the source code enables you to customize build parameters and target platforms such as Linux and macOS. The procedures in this section describe how to build source with Microsoft Visual Studio (Windows or macOS) ...
https://dev.mysql.com/doc/ndbapi/en/overview-terminology.html
This is sometimes used in the course of software upgrades and in other special circumstances. This NDB kernel block handles storage of tuples (records) and contains the filtering engine used to filter out records and attributes when performing reads ... Abstract This section provides a glossary of terms which are unique to the NDB and MGM APIs, or that have a specialized meaning when applied in the context of either or both of these ...
https://dev.mysql.com/doc/relnotes/connector-net/en/news-8-0-10.html
Functionality Added or Changed Bugs Fixed Functionality Added or Changed The .NET Core 2.0 implementation now supports the following connection-string options: AutoEnlist, InteractiveSession, Logging, Replication, and UseUsageAdvisor. (Bug ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-access-control-best-practice-ref.html
As each organization has a different way of implementing their MySQL installations and monitoring, the scenarios described are general guidelines. Strict: an organization with several DBAs and developers, and many monitored assets, grouped according ... This chapter describes some best practices for setting up your access control ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-acl-monitoring-mem-permissions.html
Authentication-level settings, such as the External Authentication and HTTP Proxy Settings on the Settings page are not visible if this is set to Read-Only. Note The following permissions require Web Application Login and MySQL Enterprise Monitor ...
https://dev.mysql.com/doc/heatwave/en/mys-hw-lakehouse-overview.html
MySQL HeatWave Lakehouse reads the source data from Object Storage, transforms it to the memory optimized MySQL HeatWave format, saves it in the MySQL HeatWave persistence storage layer in Object Storage, and then loads the data to MySQL HeatWave ...