User Security in MySQL # The MySQL privilege system ensures that all your users can perform only the operations that are allowed to them. # MySQL security works by limiting both the users who have access to a database and what they are allowed to do once they have access. # When you connect to a MySQL server, your identity is determined by the host system that you are connected to and the user ID that you specify.
# When you issue SQL statements after connecting, MySQL access control grants privileges according to your identity and what you want to do. # MySQL access control performs the following stages when you are running a client program that connects to the MySQL server: * Stage 1: The MySQL server checks whether you are allowed to connect. * Stage 2: The MySQL server checks each SQL statement that you issue to determine whether you have sufficient privileges to perform the operation.
MySQL provides the following tools that you can use to administer MySQL, work with MySQL databases, run queries, and so on: * MySQL Administrator. * MySQL Query Browser.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.