Administering User Accounts and Privileges in MySQL
Jul 10, 2025 pm 01:22 PMCreating, managing and deleting MySQL users and permissions must follow the principle of minimum permissions to ensure security. 1. Create a user to use CREATE USER and specify the host and password plug-in; 2. Assign SELECT, INSERT and other permissions as needed when granting permissions, and use FLUSH PRIVILEGES to take effect; 3. Recycle permissions or reset permissions through REVOKE; 4. Delete users to use DROP USER to clean up in time to reduce risks; at the same time pay attention to the compatibility issues of remote access protection and client.
Managing MySQL user accounts and permissions is actually not complicated, but many people who are new to database operations and maintenance are prone to traps in this area. The key is to understand the basic logic of the permission system and how to allocate account permissions safely and effectively.

Create a user: Start with the basics
MySQL user account consists of a user name and a host name, in the format 'user'@'host'
. Creating a user statement is also very simple:

CREATE USER 'new_user'@'localhost' IDENTIFIED BY 'password';
If you want this user to log in from any IP, you can change localhost
to %
:
CREATE USER 'remote_user'@'%' IDENTIFIED BY 'secure_password';
However, it should be noted that while allowing remote access, you must also ensure that your MySQL service is protected by firewalls, otherwise it will be easily attacked.

In addition, MySQL 8.0 has started to use the caching_sha2_password
plug-in by default for authentication, and some old clients may not support it. If you encounter connection problems, you can manually specify mysql_native_password
:
CREATE USER 'old_client_user'@'%' IDENTIFIED WITH mysql_native_password BY 'pass123';
Assign permissions: on-demand authorization, minimized principle
When granting permissions to users, it is recommended to follow the principle of "minimum permissions" and only open necessary permissions to avoid the risks brought about by excessive authorization.
Common permissions include:
-
SELECT
: Query data -
INSERT
: Insert data -
UPDATE
: Update data -
DELETE
: Delete data -
CREATE
: Create a table or database -
DROP
: Delete tables or databases -
GRANT OPTION
: Grant or revoke permissions from other users
For example, if you want a user to only operate tables in a certain database, you can authorize it like this:
GRANT SELECT, INSERT ON mydb.* TO 'limited_user'@'%';
Don't forget to refresh the permissions after executing the permissions:
FLUSH PRIVILEGES;
Sometimes you will find that the permissions are not effective, it may be because you forgot to refresh, or it may be because the scope of the permissions is incorrect (for example, you gave permissions to a certain library, but the user used another library).
Modification and recycling permissions: Flexible adjustment
As business changes, user permissions also need to be adjusted dynamically. You can use GRANT
to increase permissions, or you can use REVOKE
to recycle permissions.
For example, if you want to revoke the delete permission of a user to a table:
REVOKE DELETE ON mydb.mytable FROM 'limited_user'@'%';
If you find that a user has too many permissions and want to reset the permissions, you can first REVOKE ALL
and then reassign:
REVOKE ALL PRIVILEGES ON *.* FROM 'user_to_reset'@'%'; FLUSH PRIVILEGES;
Note: This does not delete the user itself, it just clears all permissions.
Delete users: Clean up accounts that are no longer needed in time
When a user no longer needs to access the database, it should be deleted in time to avoid leaving any security risks.
The command to delete a user is simple:
DROP USER 'old_user'@'localhost';
This operation will delete all permission records of the user at the same time. If you want to confirm whether the user exists, you can first check mysql.user
table:
SELECT User, Host FROM mysql.user;
However, don't change this table directly. It is recommended to use commands such as CREATE USER
, GRANT
and DROP USER
to manage users and permissions, which is safer and more standardized.
Basically that's it. Creation, authorization, adjustment, and deletion, the whole process looks quite intuitive, but in actual operation, you should pay special attention to the scope of permissions and the compatibility of password plug-in. As long as you follow the principle of minimum authority, most security risks can be controlled.
The above is the detailed content of Administering User Accounts and Privileges in MySQL. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

mysqldump is a common tool for performing logical backups of MySQL databases. It generates SQL files containing CREATE and INSERT statements to rebuild the database. 1. It does not back up the original file, but converts the database structure and content into portable SQL commands; 2. It is suitable for small databases or selective recovery, and is not suitable for fast recovery of TB-level data; 3. Common options include --single-transaction, --databases, --all-databases, --routines, etc.; 4. Use mysql command to import during recovery, and can turn off foreign key checks to improve speed; 5. It is recommended to test backup regularly, use compression, and automatic adjustment.

When handling NULL values ??in MySQL, please note: 1. When designing the table, the key fields are set to NOTNULL, and optional fields are allowed NULL; 2. ISNULL or ISNOTNULL must be used with = or !=; 3. IFNULL or COALESCE functions can be used to replace the display default values; 4. Be cautious when using NULL values ??directly when inserting or updating, and pay attention to the data source and ORM framework processing methods. NULL represents an unknown value and does not equal any value, including itself. Therefore, be careful when querying, counting, and connecting tables to avoid missing data or logical errors. Rational use of functions and constraints can effectively reduce interference caused by NULL.

GROUPBY is used to group data by field and perform aggregation operations, and HAVING is used to filter the results after grouping. For example, using GROUPBYcustomer_id can calculate the total consumption amount of each customer; using HAVING can filter out customers with a total consumption of more than 1,000. The non-aggregated fields after SELECT must appear in GROUPBY, and HAVING can be conditionally filtered using an alias or original expressions. Common techniques include counting the number of each group, grouping multiple fields, and filtering with multiple conditions.

MySQL paging is commonly implemented using LIMIT and OFFSET, but its performance is poor under large data volume. 1. LIMIT controls the number of each page, OFFSET controls the starting position, and the syntax is LIMITNOFFSETM; 2. Performance problems are caused by excessive records and discarding OFFSET scans, resulting in low efficiency; 3. Optimization suggestions include using cursor paging, index acceleration, and lazy loading; 4. Cursor paging locates the starting point of the next page through the unique value of the last record of the previous page, avoiding OFFSET, which is suitable for "next page" operation, and is not suitable for random jumps.

To view the size of the MySQL database and table, you can query the information_schema directly or use the command line tool. 1. Check the entire database size: Execute the SQL statement SELECTtable_schemaAS'Database',SUM(data_length index_length)/1024/1024AS'Size(MB)'FROMinformation_schema.tablesGROUPBYtable_schema; you can get the total size of all databases, or add WHERE conditions to limit the specific database; 2. Check the single table size: use SELECTta

To set up asynchronous master-slave replication for MySQL, follow these steps: 1. Prepare the master server, enable binary logs and set a unique server-id, create a replication user and record the current log location; 2. Use mysqldump to back up the master library data and import it to the slave server; 3. Configure the server-id and relay-log of the slave server, use the CHANGEMASTER command to connect to the master library and start the replication thread; 4. Check for common problems, such as network, permissions, data consistency and self-increase conflicts, and monitor replication delays. Follow the steps above to ensure that the configuration is completed correctly.

MySQL supports transaction processing, and uses the InnoDB storage engine to ensure data consistency and integrity. 1. Transactions are a set of SQL operations, either all succeed or all fail to roll back; 2. ACID attributes include atomicity, consistency, isolation and persistence; 3. The statements that manually control transactions are STARTTRANSACTION, COMMIT and ROLLBACK; 4. The four isolation levels include read not committed, read submitted, repeatable read and serialization; 5. Use transactions correctly to avoid long-term operation, turn off automatic commits, and reasonably handle locks and exceptions. Through these mechanisms, MySQL can achieve high reliability and concurrent control.

Character set and sorting rules issues are common when cross-platform migration or multi-person development, resulting in garbled code or inconsistent query. There are three core solutions: First, check and unify the character set of database, table, and fields to utf8mb4, view through SHOWCREATEDATABASE/TABLE, and modify it with ALTER statement; second, specify the utf8mb4 character set when the client connects, and set it in connection parameters or execute SETNAMES; third, select the sorting rules reasonably, and recommend using utf8mb4_unicode_ci to ensure the accuracy of comparison and sorting, and specify or modify it through ALTER when building the library and table.
