1. Create users when authorizing

grant all privileges on *.* to zhengwenqiang@localhost identified by 'zhengwenqiang';

2. Take back insert jurisdiction

revoke insert on *.* from zhengwenqiang@lolcalhost;

3.remainder privileges

show grants for zhengwenqiang@localhost \G;

4. Grant Rule : The least authorized 、 Permissions to meet user needs .

root@localhost :: ->select * from mysql.user where User='zhengwenqiang' \G;
*************************** . row ***************************
Host: localhost
User: zhengwenqiang
Password: *BCD85D1E5C75845943DFDCE3DEB7EB9EE6C37ED0
Select_priv: Y
Insert_priv: N
Update_priv: Y
Delete_priv: Y
Create_priv: Y
Drop_priv: Y
Reload_priv: Y
Shutdown_priv: Y
Process_priv: Y
File_priv: Y
Grant_priv: N
References_priv: Y
Index_priv: Y
Alter_priv: Y
Show_db_priv: Y
Super_priv: Y
Create_tmp_table_priv: Y
Lock_tables_priv: Y
Execute_priv: Y
Repl_slave_priv: Y
Repl_client_priv: Y
Create_view_priv: Y
Show_view_priv: Y
Create_routine_priv: Y
Alter_routine_priv: Y
Create_user_priv: Y
Event_priv: Y
Trigger_priv: Y
Create_tablespace_priv: Y
authentication_string: NULL
row in set (0.00 sec) ERROR:
No query specified

Permission management uses a unique entry 、 Take back alter jurisdiction .

MySQL More about permissions and user tables

  1. freeswitch User integration ( Use mysql The user table of the database )

    turn :freeswitch User integration ( Use mysql The user table of the database ) freeswitch It's a powerful voip The server , Voice and video . But it defaults to /directory Under folder xml To configure the user's , about ...

  2. MySQL Authority and user management

    Mysql Authority system ( from mysql Permission table user and db) Through the following two aspects of Authentication : 1) Authenticate the connected user , Legally verified , Illegal denial of connection . 2) For users authenticated by the connection , It can be within the scope of legality ...

  3. mysql Permissions and users

    One :Flush table tables_name MySQL Of FLUSH syntax ( Clear or reload the internal cache ) FLUSH flush_option [,flush_option], If you want to clear some My ...

  4. MySQL Rights management User management

    I'm using  MariaDB database see MySQL All users : select distinct concat('User: \'',user, '\'@\'', host, '\'') as que ...

  5. MySQL Password login settings in the user table in the database

    Tools :MyEclipse8.5.apache-tomcat-6.0.43.MySQL5.6 problem : The project was sent to me by my colleagues , After normal operation , Use MySQL When the administrator data in the table is logged in , Tips “ Only for non headquarter job number login !” ...

  6. MySQL Permissions and user security

    MySQL Access control is divided into two phases 1: Check if the user can connect to mysql server Stage 2: Check that the user performs sql Have you been authorized to

  7. php+MySQL The user table is divided into two tables , Make users evenly distributed

    Let's say we have 100 million registered users , We need to allocate these users equally to 100 Zhang biaozhong , And the subsequent registered users should also be evenly distributed to this 100 A watch First, when a user registers , If the user name is “username”, use php Of crc32() Function processing uses ...

  8. MySQL Get the user table from 、 User view 、 Column information in the user table

    Just post the code : /// <summary> /// MySql Database maintenance center /// </summary> public class MySqlDbMaintenance:D ...

  9. zabbix3.0.4-agent adopt shell Script get mysql Database login user

    zabbix3.0.4 Access to the database login user trend Main idea : adopt zabbix client shell Script mysql The command takes out the data in the user table and feeds the result back to zabbix, Draw a trend chart 1. modify zabbix-agent ...

Random recommendation

  1. 【bzoj1066】[SCOI2007] Lizard Network maximum flow

    [bzoj1066][SCOI2007] Lizard Description In a r That's ok c There are some stone columns of different heights in the grid map of columns , There are lizards standing on some stone pillars , Your mission is to get as many lizards as possible out of the border . The number of adjacent columns in each row and column ...

  2. Leetcode: Remove K Digits

    Given a non-negative integer num represented as a string, remove k digits from the number so that th ...

  3. iOS Push certificate generation pem

    cert: openssl x509 -in aps_development\ \(8\).cer -inform der -out pushDeveCerTopem.pem key: openssl ...

  4. js part --- type , Variable ;

    <script type="text/javascript">1. notes : use “// perhaps /**/”2. data type : (1) integer int (2) Decimal type Single precision float Shuangjing ...

  5. LPC1768 The interruption of

    An external interruption : Only certain 4 External interrupt pins , 1 On specific pins , The pin function should select the corresponding external interrupt function 2 Set trigger conditions ( High and low level . rising / Falling edge ) 3 NVIC Set up , Specific channels . Two GPIO interrupt : 1 Only GPIO0 and ...

  6. Unity3D- Art related

    1. Import animation (1) Use pre decomposed animation models , After importing, the panel will contain a list of available animation clips . (2) Use an undecomposed animation model , Add your own animation clips . (3) Using multiple animation files , Model and animation are separated . about goober.fbx model ...

  7. Java Learning notes —— Design pattern four . The proxy pattern

    To be, or not to be: that is the question. --< Hamlet > The proxy pattern (Proxy), Provides a proxy for other objects to control access to this object . Code up : p ...

  8. springboot Second kill course learning arrangement 1-5

    1) Trading model design Trading model ( A transaction model where users place orders )OrderModel id(String Transaction number use String), userId,itemId,amount( Number ),orderAmount( Total sum ...

  9. Apache Tomcat&#174; - Which Version Do I Want?

    Apache Tomcat - Which Version Do I Want?http://tomcat.apache.org/whichversion.html

  10. Keras resources

    Keras Chinese document github Keras example The official blog A ten-minute introduction to sequence-to-sequence learning in Ke ...