search
HomeCommon ProblemWhat are the permission tables of mysql database?

MySQL database permission tables include: 1. user table, used to record account information allowed to connect to the server. All permissions enabled in this table are global level and apply to all databases; 2. db table , stores the user's operating permissions for a certain database; 3. tables_priv table, used to set permissions for a single table; 4. columns_priv table, used to set permissions for a single data column; 5. procs_priv table, used for storage Procedures and stored functions set permissions.

What are the permission tables of mysql database?

The operating system of this tutorial: Windows 10 system, mysql version 8.0, Dell G3 computer.

In the MySQL database, the permission tables include the user table, db table, tables_priv table, columns_priv table and procs_priv table.

1. User permission table

The user table is the most important permission table in MySQL, used to record account information that is allowed to connect to the server. It should be noted that all permissions enabled in the user table are global and apply to all databases.

The fields in the user table can be roughly divided into 4 categories, namely user columns, permission columns, security columns and resource control columns.

User column

The user column stores the information that users need to enter when connecting to the MySQL database. It should be noted that MySQL 5.7 version no longer uses Password as the password field, but changed it to authentication_string.

Permission column

The fields in the permission column determine the user's permissions and are used to describe the operations allowed on data and databases in the global scope.

Permissions are roughly divided into two categories, namely advanced management permissions and ordinary permissions:

  • Advanced management permissions mainly manage the database, such as the permission to close services, Super permissions and loading users, etc.;

  • Normal permissions mainly operate the database, such as query permissions, modification permissions, etc.

The permission columns of the user table include Select_priv, Insert_ priv and other fields ending with priv. The data type of these field values ​​is ENUM. The only possible values ​​are Y and N: Y represents the user There are corresponding permissions, N means that the user does not have the corresponding permissions. For security reasons, the default value for these fields is N.

If you want to modify the permissions, you can use the GRANT statement to grant some permissions to the user, or you can set the permissions by updating the user table with the UPDATE statement.

Security column

The security column is mainly used to determine whether the user can log in successfully. The security column in the user table is as shown in the following table:

##Record the time when the password was last modifiedpassword_lifetimesmallint (5) unsignedYESSet the password validity time in daysaccount_lockedenum('N','Y')NONWhether the user is locked (Y is locked, N is not locked)

Note: Even if password_expired is "Y", the user can still use the password to log in to MySQL, but no operations are allowed.

Usually standard distributions do not support ssl. Readers can use the SHOW VARIABLES LIKE "have_openssl" statement to check whether it has ssl functionality. If the value of have_openssl is DISABLED, the ssl encryption feature is not supported.

Resource control column

The fields of the resource control column are used to limit the resources used by users. The resource control columns in the user table are shown in Table 4.

Security columns of the user table
Field name Field type Is it empty Default value Description
ssl_type enum('','ANY','X509','SPECIFIED') NO
Support ssl standard encryption security field
ssl_cipher blob NO
Support ssl standard encryption security field
x509_issuer blob NO
Support x509 standard fields
x509_subject blob NO
Support x509 standard fields
plugin char(64) NO mysql_native_password Introducing plugins for password verification when users connect, plugin creates external/proxy users
password_expired enum('N','Y') NO N Whether the password has expired (N has not expired, y has expired)
password_last_changed timestamp YES

Resource control column of the user table
Field name Field type Whether it is empty Default value Description
max_questions int(11) unsigned NO 0 Specifies the number of query operations allowed per hour
max_updates int(11) unsigned NO 0 Specifies the number of update operations allowed per hour
max_connections int(11) unsigned NO 0 Specifies the number of connection operations allowed per hour
max_user_connections int(11) unsigned NO 0 Specifies the number of connections allowed to be established simultaneously

The default value of the above fields is 0, indicating no limit. If the number of user queries or connections exceeds the resource control limit within an hour, the user will be locked and cannot perform corresponding operations here until the next hour. The values ​​of these fields can be updated using the GRANT statement.

2. db table

The db table is commonly used and is a very important permissions table in the MySQL database. The table stores the user's operating permissions for a certain database. The fields in the table can be roughly divided into two categories, namely user columns and permission columns.

User column

db table user column has 3 fields, namely Host, User, and Db, which identify the operation permission of a user to connect to a certain database from a certain host. These 3 fields The combination of fields constitutes the primary key of the db table.

The user list of the db table is as shown in the following table:

##Dbchar(64)NONoneDatabase nameUserchar(32)NONoneUser name

Permission columns

The permission columns in the db table are roughly the same as those in the user table, except that the permissions in the user table are for all databases, while the permissions in the db table are only for the specified database. . If you want the user to have operation permissions only for a certain database, you can first set the corresponding permissions in the user table to N, and then set the operation permissions for the corresponding database in the db table.

3. tables_priv table

The tables_priv table is used to set permissions on a single table. The tables_priv table structure is as shown in the following table:

Field name Field type Is it empty? Default value Description
Host char(60) NO None Host name
Field name Field type Whether it is empty Default value Description
Host char(60) NO None Host
Db char(64) NO None Database name
User char(32) NO None Username
Table_name char (64) NO None Table name
Grantor char(93) NO None User who modified this record
Timestamp timestamp NO CURRENT_TIMESTAMP The time to modify the record
Table_priv set('Select','Insert','Update' ,'Delete','
Create','Drop','Grant','References',
'Index','Alter','Create View','Show view','Trigger')
NO None Indicates the operation permissions on the table, including Select, Insert, Update, Delete, Create, Drop, Grant, References, Index and Alter, etc.
Column_priv set('Select','Insert','Update','References') NO None Indicates the operation permissions on the columns in the table, including Select, Insert, Update and References

4. columns_priv table

columns_priv table is used to set permissions on a single data column, columns_priv The table structure is as shown in the following table:

Field name Field type Is it empty Default value Description
Host char(60) NO No Host
Db char(64) NO None Database name
User char(32) NO None Username
Table_name char(64) NO None Table name
Column_name char(64) NO None Data column name, used to specify which data columns have operation permissions
Timestamp timestamp NO CURRENT_TIMESTAMP Modify the time of this record
Column_priv set('Select','Insert','Update','References') NO None Indicates the column in the table Operation permissions, including Select, Insert, Update and References

5. procs_priv table

The procs_priv table can set permissions on stored procedures and stored functions. The table structure of procs_priv is as shown in the table:

Field name Field type Whether it is empty Default value Description
Host char(60) NO None Host name
Db char(64) NO None Database name
User char(32) NO None Username
Routine_name char(64) NO None Indicates the name of the stored procedure or function
Routine_type enum('FUNCTION','PROCEDURE') NO None indicates the type of stored procedure or function. The Routine_type field has two values, namely FUNCTION and PROCEDURE . FUNCTION indicates that this is a function; PROCEDURE indicates that this is a
stored procedure.
Grantor char(93) NO None User who inserted or modified this record
Proc_priv set('Execute','Alter Routine','Grant') NO None indicates the permissions you have, including Execute, Alter Routine, and Grant.
Timestamp timestamp NO CURRENT_TIMESTAMP indicates the record update time

The above is the detailed content of What are the permission tables of mysql database?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
图文详解mysql架构原理图文详解mysql架构原理May 17, 2022 pm 05:54 PM

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于架构原理的相关内容,MySQL Server架构自顶向下大致可以分网络连接层、服务层、存储引擎层和系统文件层,下面一起来看一下,希望对大家有帮助。

mysql的msi与zip版本有什么区别mysql的msi与zip版本有什么区别May 16, 2022 pm 04:33 PM

mysql的msi与zip版本的区别:1、zip包含的安装程序是一种主动安装,而msi包含的是被installer所用的安装文件以提交请求的方式安装;2、zip是一种数据压缩和文档存储的文件格式,msi是微软格式的安装包。

mysql怎么去掉第一个字符mysql怎么去掉第一个字符May 19, 2022 am 10:21 AM

方法:1、利用right函数,语法为“update 表名 set 指定字段 = right(指定字段, length(指定字段)-1)...”;2、利用substring函数,语法为“select substring(指定字段,2)..”。

mysql怎么替换换行符mysql怎么替换换行符Apr 18, 2022 pm 03:14 PM

在mysql中,可以利用char()和REPLACE()函数来替换换行符;REPLACE()函数可以用新字符串替换列中的换行符,而换行符可使用“char(13)”来表示,语法为“replace(字段名,char(13),'新字符串') ”。

mysql怎么将varchar转换为int类型mysql怎么将varchar转换为int类型May 12, 2022 pm 04:51 PM

转换方法:1、利用cast函数,语法“select * from 表名 order by cast(字段名 as SIGNED)”;2、利用“select * from 表名 order by CONVERT(字段名,SIGNED)”语句。

MySQL复制技术之异步复制和半同步复制MySQL复制技术之异步复制和半同步复制Apr 25, 2022 pm 07:21 PM

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于MySQL复制技术的相关问题,包括了异步复制、半同步复制等等内容,下面一起来看一下,希望对大家有帮助。

mysql怎么判断是否是数字类型mysql怎么判断是否是数字类型May 16, 2022 am 10:09 AM

在mysql中,可以利用REGEXP运算符判断数据是否是数字类型,语法为“String REGEXP '[^0-9.]'”;该运算符是正则表达式的缩写,若数据字符中含有数字时,返回的结果是true,反之返回的结果是false。

带你把MySQL索引吃透了带你把MySQL索引吃透了Apr 22, 2022 am 11:48 AM

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了mysql高级篇的一些问题,包括了索引是什么、索引底层实现等等问题,下面一起来看一下,希望对大家有帮助。

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software