User security

360 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
360
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

User security

  1. 1. User Security in MySQL # The MySQL privilege system ensures that all your users can perform only the operations that are allowed to them. # MySQL security works by limiting both the users who have access to a database and what they are allowed to do once they have access. # When you connect to a MySQL server, your identity is determined by the host system that you are connected to and the user ID that you specify.
  2. 2. # When you issue SQL statements after connecting, MySQL access control grants privileges according to your identity and what you want to do. # MySQL access control performs the following stages when you are running a client program that connects to the MySQL server: * Stage 1: The MySQL server checks whether you are allowed to connect. * Stage 2: The MySQL server checks each SQL statement that you issue to determine whether you have sufficient privileges to perform the operation.
  3. 3. MySQL provides the following tools that you can use to administer MySQL, work with MySQL databases, run queries, and so on: * MySQL Administrator. * MySQL Query Browser.

×