What are the permission tables of mysql?
Mysql's permission tables include: 1. User table, used to record account information that is allowed to connect to the server. All permissions enabled in this table are global level and apply to all databases; 2. db table , stores the user's operating permissions for a certain database; 3. tables_priv table, used to set permissions for a single table; 4. columns_priv table, used to set permissions for a single data column; 5. procs_priv table, used for storage Procedures and stored functions set permissions.
The operating environment of this tutorial: windows7 system, mysql8 version, Dell G3 computer.
In the MySQL database, the permission tables include the user table, db table, tables_priv table, columns_priv table and procs_priv table.
user permission table
The user table is the most important permission table in MySQL, used to record account information allowed to connect to the server. It should be noted that all permissions enabled in the user table are global and apply to all databases.
The fields in the user table can be roughly divided into 4 categories, namely user columns, permission columns, security columns and resource control columns.
User column
The user column stores the information that users need to enter when connecting to the MySQL database. It should be noted that MySQL 5.7 version no longer uses Password as the password field, but changed it to authentication_string.
Permission column
The fields in the permission column determine the user's permissions and are used to describe the operations allowed on data and databases in the global scope.
Permissions are roughly divided into two categories, namely advanced management permissions and ordinary permissions:
Advanced management permissions mainly manage the database, such as the permission to close services, Super permissions and loading users, etc.;
Normal permissions mainly operate the database, such as query permissions, modification permissions, etc.
The permission columns of the user table include Select_priv, Insert_ priv and other fields ending with priv. The data type of these field values is ENUM. The only possible values are Y and N: Y represents the user There are corresponding permissions, N means that the user does not have the corresponding permissions. For security reasons, the default value for these fields is N.
If you want to modify the permissions, you can use the GRANT statement to grant some permissions to the user, or you can set the permissions by updating the user table with the UPDATE statement.
Security column
The security column is mainly used to determine whether the user can log in successfully. The security column in the user table is as shown in the following table:
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
ssl_type | enum('','ANY','X509','SPECIFIED') | NO | Support ssl standard encryption security field | |
ssl_cipher | blob | NO | Support ssl standard encryption security field | |
blob | NO | Support x509 Standard fields | ||
blob | NO | Support x509 standard fields | ||
#char(64) | NO | mysql_native_password | Introducing plugins for password verification when users connect, plugin Create external/proxy user | |
enum('N','Y') | NO | N | Whether the password has expired (N has not expired, y has expired) | |
timestamp | YES | Record the time when the password was last modified | ||
smallint(5) unsigned | YES | Set the password validity time in days | ||
enum('N','Y') | NO | N | Whether the user is locked (Y is locked, N is not locked) |
Field name | Field type | Whether it is empty | Default value | Description |
---|---|---|---|---|
max_questions | int(11) unsigned | NO | 0 | Specifies the number of query operations allowed per hour |
max_updates | int(11) unsigned | NO | 0 | Specifies the number of update operations allowed per hour |
max_connections | int(11) unsigned | NO | 0 | Specifies the number of connection operations allowed per hour |
max_user_connections | int(11) unsigned | NO | 0 | Specifies the number of connections allowed to be established simultaneously |
The default value of the above fields is 0, indicating no limit. If the number of user queries or connections exceeds the resource control limit within an hour, the user will be locked and cannot perform corresponding operations here until the next hour. The values of these fields can be updated using the GRANT statement.
db table
The db table is commonly used and is a very important permission table in the MySQL database. The table stores the user's permissions for a certain database. operating authority. The fields in the table can be roughly divided into two categories, namely user columns and permission columns.
User column
The db table user column has 3 fields, namely Host, User, and Db, which identify a user connecting to a database from a certain host. The combination of these three fields constitutes the primary key of the db table.
The user list of the db table is as shown in the following table:
Field name | Field type | Is it empty? | Default value | Description |
---|---|---|---|---|
Host | char(60) | NO | None | Host name |
char(64) | NO | None | Database name | |
char(32) | NO | None | User name |
Permission columns
The permission columns in the db table are roughly the same as those in the user table, except that the Permissions are for all databases, while the permissions in the db table are only for the specified database. If you want the user to have operation permissions only for a certain database, you can first set the corresponding permissions in the user table to N, and then set the operation permissions for the corresponding database in the db table.tables_priv table and columns_priv table
The tables_priv table is used to set permissions on a single table, and the columns_priv table is used to set permissions on a single data column. set up. The tables_priv table structure is as shown in the following table:Field type | Is it empty | Default value | Description | |
---|---|---|---|---|
char(60) | NO | None | Host | |
char(64) | NO | None | Database name | |
char(32) | NO | None | Username | |
char(64) | NO | None | Table name | |
char(93) | NO | None | User who modified this record | |
timestamp | NO | CURRENT_TIMESTAMP | The time to modify the record | |
set( 'Select','Insert','Update','Delete',' | Create','Drop','Grant','References', 'Index','Alter','Create View' ,'Show view','Trigger') | NONone | indicates the operation permissions on the table, including Select, Insert, Update, Delete, Create, Drop, Grant, References, Index and Alter, etc. | |
set('Select','Insert','Update','References') | NO | None | Indicates the operation permissions on the columns in the table, including Select, Insert, Update and References |
Field name | Field type | Is it empty | Default value | Description |
---|---|---|---|---|
char(60) | NO | None | Host | |
char(64) | NO | None | Database name | |
char(32) | NO | None | Username | |
char(64) | NO | None | Table name | |
char(64) | NO | None | Data column name, used to specify which data columns have operation permissions | |
timestamp | NO | CURRENT_TIMESTAMP | Modify the time of this record | |
set('Select','Insert','Update','References') | NO | None | means yes Operation permissions for columns in the table, including Select, Insert, Update and References |
##procs_priv table## The #procs_priv table can set permissions on stored procedures and stored functions. The table structure of procs_priv is as shown in the table:
Whether it is empty | Default value | Description | Host | |
---|---|---|---|---|
NO | None | Host Name | Db | |
NO | None | Database name | User | |
NO | None | Username | Routine_name | |
NO | None | Represents the name of a stored procedure or function | Routine_type | |
NO | None | Indicates the type of stored procedure or function. The Routine_type field has two values, namely FUNCTION and PROCEDURE. FUNCTION indicates that this is a function; PROCEDURE indicates that this is a | stored procedure. | |
NO | None | User who inserted or modified this record | Proc_priv | |
NO | None | indicates the permissions you have, including Execute, Alter Routine, and Grant. | Timestamp | |
NO | CURRENT_TIMESTAMP | indicates the record update time |
The above is the detailed content of What are the permission tables of mysql?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

MySQL is an open source relational database management system, mainly used to store and retrieve data quickly and reliably. Its working principle includes client requests, query resolution, execution of queries and return results. Examples of usage include creating tables, inserting and querying data, and advanced features such as JOIN operations. Common errors involve SQL syntax, data types, and permissions, and optimization suggestions include the use of indexes, optimized queries, and partitioning of tables.

Apache connects to a database requires the following steps: Install the database driver. Configure the web.xml file to create a connection pool. Create a JDBC data source and specify the connection settings. Use the JDBC API to access the database from Java code, including getting connections, creating statements, binding parameters, executing queries or updates, and processing results.

MySQL's position in databases and programming is very important. It is an open source relational database management system that is widely used in various application scenarios. 1) MySQL provides efficient data storage, organization and retrieval functions, supporting Web, mobile and enterprise-level systems. 2) It uses a client-server architecture, supports multiple storage engines and index optimization. 3) Basic usages include creating tables and inserting data, and advanced usages involve multi-table JOINs and complex queries. 4) Frequently asked questions such as SQL syntax errors and performance issues can be debugged through the EXPLAIN command and slow query log. 5) Performance optimization methods include rational use of indexes, optimized query and use of caches. Best practices include using transactions and PreparedStatemen

MySQL is chosen for its performance, reliability, ease of use, and community support. 1.MySQL provides efficient data storage and retrieval functions, supporting multiple data types and advanced query operations. 2. Adopt client-server architecture and multiple storage engines to support transaction and query optimization. 3. Easy to use, supports a variety of operating systems and programming languages. 4. Have strong community support and provide rich resources and solutions.

The main role of MySQL in web applications is to store and manage data. 1.MySQL efficiently processes user information, product catalogs, transaction records and other data. 2. Through SQL query, developers can extract information from the database to generate dynamic content. 3.MySQL works based on the client-server model to ensure acceptable query speed.

The process of starting MySQL in Docker consists of the following steps: Pull the MySQL image to create and start the container, set the root user password, and map the port verification connection Create the database and the user grants all permissions to the database

Laravel is a PHP framework for easy building of web applications. It provides a range of powerful features including: Installation: Install the Laravel CLI globally with Composer and create applications in the project directory. Routing: Define the relationship between the URL and the handler in routes/web.php. View: Create a view in resources/views to render the application's interface. Database Integration: Provides out-of-the-box integration with databases such as MySQL and uses migration to create and modify tables. Model and Controller: The model represents the database entity and the controller processes HTTP requests.

The key to installing MySQL elegantly is to add the official MySQL repository. The specific steps are as follows: Download the MySQL official GPG key to prevent phishing attacks. Add MySQL repository file: rpm -Uvh https://dev.mysql.com/get/mysql80-community-release-el7-3.noarch.rpm Update yum repository cache: yum update installation MySQL: yum install mysql-server startup MySQL service: systemctl start mysqld set up booting
