The user table is in the database named "mysql". MySQL will automatically create a database named "mysql" during installation. The mysql database stores user permission tables; the user table is the most important permission table in the mysql database and is used to record the accounts allowed to connect to the server. information. All permissions enabled in the user table are global and apply to all databases.
The operating environment of this tutorial: windows7 system, mysql8 version, Dell G3 computer.
The user table is in the database named "mysql".
MySQL will automatically create a database named mysql during installation. The mysql database stores user permission tables. After the user logs in, MySQL will grant corresponding permissions to each user based on the contents of these permission tables.
The user table is the most important permission table in MySQL, used to record account information allowed to connect to the server. It should be noted that all permissions enabled in the user table are global and apply to all databases.
Fields in the user table
The fields in the user table can be roughly divided into There are 4 categories, namely user columns, permission columns, security columns and resource control columns. The following mainly introduces the meaning of these fields.
User column
The user column stores the information that users need to enter when connecting to the MySQL database. It should be noted that MySQL 5.7 version no longer uses Password as the password field, but changed it to authentication_string.
The user list for MySQL version 5.7 is shown in Table 1.
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | None | Host Name |
User | char(32) | NO | None | Username |
authentication_string | text | YES | None | Password |
When a user logs in, the MySQL database system will only allow him or her to log in if these three fields match at the same time. When creating a new user, the values of these three fields are also set. When you modify a user's password, you actually modify the value of the authentication_string field of the user table. Therefore, these 3 fields determine whether the user can log in.
Permission column
The fields in the permission column determine the user's permissions and are used to describe the operations allowed on data and databases in the global scope.
Permissions are roughly divided into two categories, namely advanced management permissions and ordinary permissions:
- Advanced management permissions mainly manage the database, such as the permission to close services, super permissions and Load users, etc.;
- Normal permissions mainly operate the database, such as query permissions, modify permissions, etc.
The permission columns of the user table include Select_priv, Insert_ priv and other fields ending with priv. The data type of these field values is ENUM. The only possible values are Y and N: Y means that the user has corresponding Permissions, N means that the user does not have corresponding permissions. For security reasons, the default value for these fields is N.
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
enum('N','Y') | NO | N | Whether it is possible to query data through the SELECT command | |
enum('N','Y') | NO | N | Whether data can be inserted through the INSERT command | |
enum('N','Y' ) | NO | N | Can existing data be modified through the UPDATE command? | |
enum ('N','Y') | NO | N | Can you delete existing data through the DELETE command? | |
enum('N','Y') | NO | N | Can create new databases and tables | |
enum('N','Y') | NO | N | Can I delete an existing database? and table | |
enum('N','Y') | NO | N | Is it possible to execute specific commands that refresh and reload the various internal caches used by MySQL, including logs, permissions, hosts, queries, and tables | |
enum( 'N','Y') | NO | N | Whether it is possible to shut down the MySQL server. Extreme caution should be exercised when providing this privilege to any user other than the root account | |
enum('N','Y') | NO | N | Can I check the processes of other users through the SHOW PROCESSLIST command? | |
enum(' N','Y') | NO | N | Whether it is possible to execute the SELECT INTO OUTFILE and LOAD DATA INFILE commands | |
enum('N','Y') | NO | N | Can I grant my permissions to other users? | |
enum('N','Y') | NO | N | Can create external Key constraints | |
enum('N','Y') | NO | N | Whether it is possible to perform addition and deletion checks on the index | |
enum('N','Y') | NO | N | Can the table structure be renamed and modified | |
enum('N','Y') | NO | N | Is it possible to view the names of all databases on the server, including databases to which the user has sufficient access rights | |
enum('N','Y') | NO | N | Whether it is possible to perform some powerful management functions, such as deleting user processes through the KILL command; use The SET GLOBAL command modifies global MySQL variables and executes various commands regarding replication and logging. (Super permission) | |
enum('N','Y') | NO | N | Is it possible to create a temporary table | |
enum('N','Y') | NO | N | Is it possible to use the LOCK TABLES command to prevent access/modification of tables | |
enum('N','Y') | NO | N | Can the stored procedure be executed? | |
enum('N',' Y') | NO | N | Is it possible to read the binary log file used to maintain a replicated database environment | |
enum('N','Y') | NO | N | Is it possible to determine the location of the replication slave server and master server | |
enum('N','Y') | NO | N | Can a view be created? | |
enum('N','Y') | NO | N | Yes Can view view | |
enum('N','Y') | NO | N | Whether stored procedures and functions can be changed or discarded | |
enum('N','Y') | NO | N | Whether stored functions and functions can be modified or deleted | |
enum('N','Y') | NO | N | Whether it is possible to execute the CREATE USER command, which is used to create a new MySQL account | |
enum('N','Y') | NO | N | Whether events can be created, modified and deleted | |
enum('N','Y') | NO | N | Whether triggers can be created and deleted | |
enum('N','Y') | NO | N | Can the table be created? space |
Field name | Field type | Whether it is empty | Default value | Description |
---|---|---|---|---|
enum('','ANY','X509','SPECIFIED') | NO | Support ssl standard encryption security field | ||
blob | NO | Support ssl standard encryption security field | ||
blob | NO | Support x509 standard fields | ||
blob | NO | Support x509 Standard fields | ||
char(64) | NO | mysql_native_password | Introducing plugins for user Password verification when connecting, plugin creates external/proxy user | |
enum('N','Y') | NO | N | Whether the password has expired (N has not expired, y has expired) | |
timestamp | YES | Record the time when the password was last modified | ||
smallint(5) unsigned | YES | Set the validity time of the password in days | ||
enum('N','Y') | NO | N | Whether the user is locked (Y locked, N unlocked) |
Resource control column
The fields of the resource control column are used to limit the resources used by users. The resource control columns in the user table are shown in Table 4.Field type | Yes Is empty | Default value | Description | |
---|---|---|---|---|
int(11) unsigned | NO | 0 | Specifies the number of query operations allowed per hour | |
int(11) unsigned | NO | 0 | Specifies the number of update operations allowed per hour | |
int(11) unsigned | NO | 0 | Specifies the number of connection operations allowed per hour | |
int(11) unsigned | NO | 0 | Specifies the number of connections allowed to be established simultaneously |
How to access the user table
1. Connect to the mysql database and view all default database informationmysql video tutorial]
The above is the detailed content of Where is the user table of mysql?. For more information, please follow other related articles on the PHP Chinese website!

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于架构原理的相关内容,MySQL Server架构自顶向下大致可以分网络连接层、服务层、存储引擎层和系统文件层,下面一起来看一下,希望对大家有帮助。

方法:1、利用right函数,语法为“update 表名 set 指定字段 = right(指定字段, length(指定字段)-1)...”;2、利用substring函数,语法为“select substring(指定字段,2)..”。

mysql的msi与zip版本的区别:1、zip包含的安装程序是一种主动安装,而msi包含的是被installer所用的安装文件以提交请求的方式安装;2、zip是一种数据压缩和文档存储的文件格式,msi是微软格式的安装包。

在mysql中,可以利用char()和REPLACE()函数来替换换行符;REPLACE()函数可以用新字符串替换列中的换行符,而换行符可使用“char(13)”来表示,语法为“replace(字段名,char(13),'新字符串') ”。

转换方法:1、利用cast函数,语法“select * from 表名 order by cast(字段名 as SIGNED)”;2、利用“select * from 表名 order by CONVERT(字段名,SIGNED)”语句。

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于MySQL复制技术的相关问题,包括了异步复制、半同步复制等等内容,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了mysql高级篇的一些问题,包括了索引是什么、索引底层实现等等问题,下面一起来看一下,希望对大家有帮助。

在mysql中,可以利用REGEXP运算符判断数据是否是数字类型,语法为“String REGEXP '[^0-9.]'”;该运算符是正则表达式的缩写,若数据字符中含有数字时,返回的结果是true,反之返回的结果是false。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

Dreamweaver Mac version
Visual web development tools

Notepad++7.3.1
Easy-to-use and free code editor

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Mac version
God-level code editing software (SublimeText3)
