MySQL database permission tables include: 1. user table, used to record account information allowed to connect to the server. All permissions enabled in this table are global level and apply to all databases; 2. db table , stores the user's operating permissions for a certain database; 3. tables_priv table, used to set permissions for a single table; 4. columns_priv table, used to set permissions for a single data column; 5. procs_priv table, used for storage Procedures and stored functions set permissions.
The operating system of this tutorial: Windows 10 system, mysql version 8.0, Dell G3 computer.
In the MySQL database, the permission tables include the user table, db table, tables_priv table, columns_priv table and procs_priv table.
1. User permission table
The user table is the most important permission table in MySQL, used to record account information that is allowed to connect to the server. It should be noted that all permissions enabled in the user table are global and apply to all databases.
The fields in the user table can be roughly divided into 4 categories, namely user columns, permission columns, security columns and resource control columns.
User column
The user column stores the information that users need to enter when connecting to the MySQL database. It should be noted that MySQL 5.7 version no longer uses Password as the password field, but changed it to authentication_string.
Permission column
The fields in the permission column determine the user's permissions and are used to describe the operations allowed on data and databases in the global scope.
Permissions are roughly divided into two categories, namely advanced management permissions and ordinary permissions:
Advanced management permissions mainly manage the database, such as the permission to close services, Super permissions and loading users, etc.;
Normal permissions mainly operate the database, such as query permissions, modification permissions, etc.
The permission columns of the user table include Select_priv, Insert_ priv and other fields ending with priv. The data type of these field values is ENUM. The only possible values are Y and N: Y represents the user There are corresponding permissions, N means that the user does not have the corresponding permissions. For security reasons, the default value for these fields is N.
If you want to modify the permissions, you can use the GRANT statement to grant some permissions to the user, or you can set the permissions by updating the user table with the UPDATE statement.
Security column
The security column is mainly used to determine whether the user can log in successfully. The security column in the user table is as shown in the following table:
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
ssl_type | enum('','ANY','X509','SPECIFIED') | NO | Support ssl standard encryption security field | |
ssl_cipher | blob | NO | Support ssl standard encryption security field | |
x509_issuer | blob | NO | Support x509 standard fields | |
x509_subject | blob | NO | Support x509 standard fields | |
plugin | char(64) | NO | mysql_native_password | Introducing plugins for password verification when users connect, plugin creates external/proxy users |
password_expired | enum('N','Y') | NO | N | Whether the password has expired (N has not expired, y has expired) |
password_last_changed | timestamp | YES | ||
smallint (5) unsigned | YES | |||
enum('N','Y') | NO | N | Whether the user is locked (Y is locked, N is not locked) |
Field name | Field type | Whether it is empty | Default value | Description |
---|---|---|---|---|
max_questions | int(11) unsigned | NO | 0 | Specifies the number of query operations allowed per hour |
max_updates | int(11) unsigned | NO | 0 | Specifies the number of update operations allowed per hour |
max_connections | int(11) unsigned | NO | 0 | Specifies the number of connection operations allowed per hour |
max_user_connections | int(11) unsigned | NO | 0 | Specifies the number of connections allowed to be established simultaneously |
The default value of the above fields is 0, indicating no limit. If the number of user queries or connections exceeds the resource control limit within an hour, the user will be locked and cannot perform corresponding operations here until the next hour. The values of these fields can be updated using the GRANT statement.
2. db table
The db table is commonly used and is a very important permissions table in the MySQL database. The table stores the user's operating permissions for a certain database. The fields in the table can be roughly divided into two categories, namely user columns and permission columns.
User column
db table user column has 3 fields, namely Host, User, and Db, which identify the operation permission of a user to connect to a certain database from a certain host. These 3 fields The combination of fields constitutes the primary key of the db table.
The user list of the db table is as shown in the following table:
Field name | Field type | Is it empty? | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | None | Host name |
char(64) | NO | None | Database name | |
char(32) | NO | None | User name |
Field name | Field type | Whether it is empty | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | None | Host |
Db | char(64) | NO | None | Database name |
User | char(32) | NO | None | Username |
Table_name | char (64) | NO | None | Table name |
Grantor | char(93) | NO | None | User who modified this record |
Timestamp | timestamp | NO | CURRENT_TIMESTAMP | The time to modify the record |
Table_priv | set('Select','Insert','Update' ,'Delete',' Create','Drop','Grant','References', 'Index','Alter','Create View','Show view','Trigger') |
NO | None | Indicates the operation permissions on the table, including Select, Insert, Update, Delete, Create, Drop, Grant, References, Index and Alter, etc. |
Column_priv | set('Select','Insert','Update','References') | NO | None | Indicates the operation permissions on the columns in the table, including Select, Insert, Update and References |
4. columns_priv table
columns_priv table is used to set permissions on a single data column, columns_priv The table structure is as shown in the following table:
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | No | Host |
Db | char(64) | NO | None | Database name |
User | char(32) | NO | None | Username |
Table_name | char(64) | NO | None | Table name |
Column_name | char(64) | NO | None | Data column name, used to specify which data columns have operation permissions |
Timestamp | timestamp | NO | CURRENT_TIMESTAMP | Modify the time of this record |
Column_priv | set('Select','Insert','Update','References') | NO | None | Indicates the column in the table Operation permissions, including Select, Insert, Update and References |
5. procs_priv table
The procs_priv table can set permissions on stored procedures and stored functions. The table structure of procs_priv is as shown in the table:
Field name | Field type | Whether it is empty | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | None | Host name |
Db | char(64) | NO | None | Database name |
User | char(32) | NO | None | Username |
Routine_name | char(64) | NO | None | Indicates the name of the stored procedure or function |
Routine_type | enum('FUNCTION','PROCEDURE') | NO | None | indicates the type of stored procedure or function. The Routine_type field has two values, namely FUNCTION and PROCEDURE . FUNCTION indicates that this is a function; PROCEDURE indicates that this is a stored procedure. |
Grantor | char(93) | NO | None | User who inserted or modified this record |
Proc_priv | set('Execute','Alter Routine','Grant') | NO | None | indicates the permissions you have, including Execute, Alter Routine, and Grant. |
Timestamp | timestamp | NO | CURRENT_TIMESTAMP | indicates the record update time |
The above is the detailed content of What are the permission tables of mysql database?. For more information, please follow other related articles on the PHP Chinese website!

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于架构原理的相关内容,MySQL Server架构自顶向下大致可以分网络连接层、服务层、存储引擎层和系统文件层,下面一起来看一下,希望对大家有帮助。

mysql的msi与zip版本的区别:1、zip包含的安装程序是一种主动安装,而msi包含的是被installer所用的安装文件以提交请求的方式安装;2、zip是一种数据压缩和文档存储的文件格式,msi是微软格式的安装包。

方法:1、利用right函数,语法为“update 表名 set 指定字段 = right(指定字段, length(指定字段)-1)...”;2、利用substring函数,语法为“select substring(指定字段,2)..”。

在mysql中,可以利用char()和REPLACE()函数来替换换行符;REPLACE()函数可以用新字符串替换列中的换行符,而换行符可使用“char(13)”来表示,语法为“replace(字段名,char(13),'新字符串') ”。

转换方法:1、利用cast函数,语法“select * from 表名 order by cast(字段名 as SIGNED)”;2、利用“select * from 表名 order by CONVERT(字段名,SIGNED)”语句。

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于MySQL复制技术的相关问题,包括了异步复制、半同步复制等等内容,下面一起来看一下,希望对大家有帮助。

在mysql中,可以利用REGEXP运算符判断数据是否是数字类型,语法为“String REGEXP '[^0-9.]'”;该运算符是正则表达式的缩写,若数据字符中含有数字时,返回的结果是true,反之返回的结果是false。

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了mysql高级篇的一些问题,包括了索引是什么、索引底层实现等等问题,下面一起来看一下,希望对大家有帮助。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
