search
HomeDatabaseMysql TutorialMySQL 创建用户、受权

MySQL 创建用户、授权 一,?创建用户: ???????命令: CREATE?USER?'username'@'host'?IDENTIFIED?BY?'password'; ???????说明:username?-?你将创建的用户名,?host?-?指定该用户在哪个主机上可以登陆,如果是本地用户可用localhost,?如果想让该用户可以从任意远程

MySQL 创建用户、授权
一,?创建用户:

???????命令: CREATE?USER?'username'@'host'?IDENTIFIED?BY?'password';

???????说明:username?-?你将创建的用户名,?host?-?指定该用户在哪个主机上可以登陆,如果是本地用户可用localhost,?如果想让该用户可以从任意远程主机登陆,可以使用通配符%.?password?-?该用户的登陆密码,密码可以为空,如果为空则该用户可以不需要密码登陆服务器.

??????例子:?CREATE?USER?'dog'@'localhost'?IDENTIFIED?BY?'123456';
????????????CREATE?USER?'pig'@'192.168.1.101_'?IDENDIFIED?BY?'123456';
????????????CREATE?USER?'pig'@'%'?IDENTIFIED?BY?'123456';
????????????CREATE?USER?'pig'@'%'?IDENTIFIED?BY?'';
????????????CREATE?USER?'pig'@'%';

二,授权:

??????命令: GRANT?privileges?ON?databasename.tablename?TO?'username'@'host'

?????说明:?privileges?-?用户的操作权限,如SELECT?,?INSERT?,?UPDATE?等.如果要授予所的权限则使用ALL.;databasename?-?数据库名,tablename-表名,如果要授予该用户对所有数据库和表的相应操作权限则可用*表示,?如*.*.

??????例子:?GRANT?SELECT,?INSERT?ON?test.user?TO?'pig'@'%';
????????????GRANT?ALL?ON?*.*?TO?'pig'@'%';

??????注意:用以上命令授权的用户不能给其它用户授权,如果想让该用户可以授权,用以下命令:
???????????GRANT?privileges?ON?databasename.tablename?TO?'username'@'host'?WITH?GRANT?OPTION;

三.设置与更改用户密码

?????命令: SET?PASSWORD?FOR?'username'@'host'?=?PASSWORD('newpassword');
如果是当前登陆用户用SET?PASSWORD?=?PASSWORD("newpassword");

??????例子:?SET?PASSWORD?FOR?'pig'@'%'?=?PASSWORD("123456");

四.撤销用户权限

??????命令:?REVOKE?privilege?ON?databasename.tablename?FROM?'username'@'host';

????? 说明:?privilege,?databasename,?tablename?-?同授权部分.

??????例子:?REVOKE?SELECT?ON?*.*?FROM?'pig'@'%';

??????注意:?假如你在给用户'pig'@'%'授权的时候是这样的(或类似的):GRANT?SELECT?ON?test.user?TO?'pig'@'%',?则在使用REVOKE?SELECT?ON?*.*?FROM?'pig'@'%';命令并不能撤销该用户对test数据库中user表的SELECT?操作.相反,如果授权使用的是GRANT?SELECT?ON?*.*?TO?'pig'@'%';则REVOKE?SELECT?ON?test.user?FROM?'pig'@'%';命令也不能撤销该用户对test数据库中user表的Select?权限.

??????具体信息可以用命令SHOW?GRANTS?FOR?'pig'@'%';?查看.

五.删除用户

??????命令:?DROP?USER?'username'@'host';



PS:
  
 SELECT * FROM mysql.user;
CREATE USER 'jm-dev'@'%' IDENTIFIED BY '_jiami2013';
GRANT ALL ON *.* TO 'jm-dev'@'%' IDENTIFIED BY '_jiami2013' WITH GRANT OPTION;
FLUSH PRIVILEGES;


远程访问:

xusongqin@xusongqin-A75MG:/usr/local/mysql$ netstat -an | grep 3306
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN    
tcp        0      0 127.0.0.1:35443         127.0.0.1:3306          ESTABLISHED
tcp        0      0 127.0.0.1:3306          127.0.0.1:35443         ESTABLISHED
tcp        0      0 127.0.0.1:35497         127.0.0.1:3306          ESTABLISHED
tcp        0      0 127.0.0.1:3306          127.0.0.1:35498         ESTABLISHED
tcp        0      0 127.0.0.1:3306          127.0.0.1:35493         ESTABLISHED
tcp        0      0 127.0.0.1:35493         127.0.0.1:3306          ESTABLISHED
tcp        0      0 127.0.0.1:3306          127.0.0.1:35497         ESTABLISHED
tcp        0      0 127.0.0.1:35498         127.0.0.1:3306          ESTABLISHED


netstat可以看出第一个监听就是mysql,但是监听的是127.0.0.1,查看sudo gedit /etc/init.d/mysql/my.conf
中的bind-address = 127.0.0.1 将这句注释掉,即可以远程访问.

xusongqin@xusongqin-A75MG:/usr/local/mysql$ sudo netstat -an|grep 3306
tcp        0      0 0.0.0.0:3306            0.0.0.0:*               LISTEN    
tcp        1      0 127.0.0.1:35443         127.0.0.1:3306          CLOSE_WAIT
tcp        0      0 127.0.0.1:3306          127.0.0.1:35443         FIN_WAIT2 
tcp        1      0 127.0.0.1:35497         127.0.0.1:3306          CLOSE_WAIT
tcp        0      0 127.0.0.1:3306          127.0.0.1:35498         FIN_WAIT2 
tcp        0      0 127.0.0.1:3306          127.0.0.1:35493         FIN_WAIT2 
tcp        1      0 127.0.0.1:35493         127.0.0.1:3306          CLOSE_WAIT
tcp        0      0 127.0.0.1:3306          127.0.0.1:35497         FIN_WAIT2 
tcp        1      0 127.0.0.1:35498         127.0.0.1:3306          CLOSE_WAIT
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to Grant Permissions to New MySQL UsersHow to Grant Permissions to New MySQL UsersMay 09, 2025 am 12:16 AM

TograntpermissionstonewMySQLusers,followthesesteps:1)AccessMySQLasauserwithsufficientprivileges,2)CreateanewuserwiththeCREATEUSERcommand,3)UsetheGRANTcommandtospecifypermissionslikeSELECT,INSERT,UPDATE,orALLPRIVILEGESonspecificdatabasesortables,and4)

How to Add Users in MySQL: A Step-by-Step GuideHow to Add Users in MySQL: A Step-by-Step GuideMay 09, 2025 am 12:14 AM

ToaddusersinMySQLeffectivelyandsecurely,followthesesteps:1)UsetheCREATEUSERstatementtoaddanewuser,specifyingthehostandastrongpassword.2)GrantnecessaryprivilegesusingtheGRANTstatement,adheringtotheprincipleofleastprivilege.3)Implementsecuritymeasuresl

MySQL: Adding a new user with complex permissionsMySQL: Adding a new user with complex permissionsMay 09, 2025 am 12:09 AM

ToaddanewuserwithcomplexpermissionsinMySQL,followthesesteps:1)CreatetheuserwithCREATEUSER'newuser'@'localhost'IDENTIFIEDBY'password';.2)Grantreadaccesstoalltablesin'mydatabase'withGRANTSELECTONmydatabase.TO'newuser'@'localhost';.3)Grantwriteaccessto'

MySQL: String Data Types and CollationsMySQL: String Data Types and CollationsMay 09, 2025 am 12:08 AM

The string data types in MySQL include CHAR, VARCHAR, BINARY, VARBINARY, BLOB, and TEXT. The collations determine the comparison and sorting of strings. 1.CHAR is suitable for fixed-length strings, VARCHAR is suitable for variable-length strings. 2.BINARY and VARBINARY are used for binary data, and BLOB and TEXT are used for large object data. 3. Sorting rules such as utf8mb4_unicode_ci ignores upper and lower case and is suitable for user names; utf8mb4_bin is case sensitive and is suitable for fields that require precise comparison.

MySQL: What length should I use for VARCHARs?MySQL: What length should I use for VARCHARs?May 09, 2025 am 12:06 AM

The best MySQLVARCHAR column length selection should be based on data analysis, consider future growth, evaluate performance impacts, and character set requirements. 1) Analyze the data to determine typical lengths; 2) Reserve future expansion space; 3) Pay attention to the impact of large lengths on performance; 4) Consider the impact of character sets on storage. Through these steps, the efficiency and scalability of the database can be optimized.

MySQL BLOB : are there any limits?MySQL BLOB : are there any limits?May 08, 2025 am 12:22 AM

MySQLBLOBshavelimits:TINYBLOB(255bytes),BLOB(65,535bytes),MEDIUMBLOB(16,777,215bytes),andLONGBLOB(4,294,967,295bytes).TouseBLOBseffectively:1)ConsiderperformanceimpactsandstorelargeBLOBsexternally;2)Managebackupsandreplicationcarefully;3)Usepathsinst

MySQL : What are the best tools to automate users creation?MySQL : What are the best tools to automate users creation?May 08, 2025 am 12:22 AM

The best tools and technologies for automating the creation of users in MySQL include: 1. MySQLWorkbench, suitable for small to medium-sized environments, easy to use but high resource consumption; 2. Ansible, suitable for multi-server environments, simple but steep learning curve; 3. Custom Python scripts, flexible but need to ensure script security; 4. Puppet and Chef, suitable for large-scale environments, complex but scalable. Scale, learning curve and integration needs should be considered when choosing.

MySQL: Can I search inside a blob?MySQL: Can I search inside a blob?May 08, 2025 am 12:20 AM

Yes,youcansearchinsideaBLOBinMySQLusingspecifictechniques.1)ConverttheBLOBtoaUTF-8stringwithCONVERTfunctionandsearchusingLIKE.2)ForcompressedBLOBs,useUNCOMPRESSbeforeconversion.3)Considerperformanceimpactsanddataencoding.4)Forcomplexdata,externalproc

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool