In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)05/31 Report--
This article will explain in detail how to access the control system of MySQL. The editor thinks it is very practical, so I share it with you as a reference. I hope you can get something after reading this article.
MySQL implements complex access control and permission systems that allow you to create comprehensive access rules for handling client operations and effectively prevent unauthorized clients from accessing the database system.
When a client connects to the server, MySQL access control has two phases:
Connection authentication: the client connecting to the MySQL database server needs to have a valid user name and password. In addition, the host to which the client connects must match the host in the MySQL authorization table.
Request verification: when the connection is successfully established, MySQL checks whether the client has sufficient permissions to execute that particular statement for each statement issued by the client. MySQL can check database, table, and field-level permissions
The MySQL installer automatically creates a database called mysql. The mysql database contains five main authorization tables. You can manipulate these tables indirectly through statements such as GRANT and REVOKE
User table: contains user accounts and global permissions columns. MySQL uses the user table to accept or reject connections from the host. The permissions granted in the user table are valid for all databases on the MySQL server.
Db table: contains database-level permissions. MySQL uses database tables to determine which database and which host the user can access. The privileges granted at the database level in the db table apply to the database, where all objects belong, such as tables, triggers, views, stored procedures, and so on.
Table_priv and columns_ private tables: contains table-level and column-level permissions. The permissions granted in the table_ private table apply to the table and its columns, while the permissions granted in the columns_ private table apply only to specific columns of the table.
Procs_ private table: contains permissions for stored functions and stored procedures.
MySQL uses these tables to control the permissions of the MySQL database server. It is important to understand these tables before implementing your own flexible access control system.
This is the end of this article on "how to access Control system for MySQL". I hope the above content can be helpful to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.