We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
6.1.3 Making MySQL Secure Against Attackers .................................................................. 774 6.1.4 Security-Related mysqld Options and Variables ......................................................... 775 6.1.5 How to Run MySQL as a Normal User ...................................................................... 776 6.1.6 Security Issues with LOAD DATA LOCAL .................................................................. 777 6.1.7 Client Programming Security Guidelines .................................................................... 778 6.2 The MySQL Access Privilege System .................................................................................. 779 6.2.1 Privileges Provided by MySQL .................................................................................. 780 6.2.2 Grant Tables ............................................................................................................ 784 6.2.3 Specifying Account Names ....................................................................................... 789 6.2.4 Access Control, Stage 1: Connection Verification ....................................................... 791 6.2.5 Access Control, Stage 2: Request Verification ........................................................... 794 6.2.6 When Privilege Changes Take Effect ........................................................................ 795 6.2.7 Troubleshooting Problems Connecting to MySQL ....................................................... 796 6.3 MySQL User Account Management ..................................................................................... 801 6.3.1 User Names and Passwords ..................................................................................... 801 6.3.2 Adding User Accounts .............................................................................................. 802 6.3.3 Removing User Accounts ......................................................................................... 804 6.3.4 Setting Account Resource Limits ............................................................................... 804 6.3.5 Assigning Account Passwords ................................................................................... 806 6.3.6 Password Expiration and Sandbox Mode ................................................................... 808 6.3.7 Pluggable Authentication ........................................................................................... 810 6.3.8 Proxy Users ............................................................................................................. 813 6.3.9 SQL-Based MySQL Account Activity Auditing............................................................ 818 其余已有2013年版本翻译,年后更新
The text was updated successfully, but these errors were encountered:
No branches or pull requests
未翻译部分
6.1.3 Making MySQL Secure Against Attackers .................................................................. 774
6.1.4 Security-Related mysqld Options and Variables ......................................................... 775
6.1.5 How to Run MySQL as a Normal User ...................................................................... 776
6.1.6 Security Issues with LOAD DATA LOCAL .................................................................. 777
6.1.7 Client Programming Security Guidelines .................................................................... 778
6.2 The MySQL Access Privilege System .................................................................................. 779
6.2.1 Privileges Provided by MySQL .................................................................................. 780
6.2.2 Grant Tables ............................................................................................................ 784
6.2.3 Specifying Account Names ....................................................................................... 789
6.2.4 Access Control, Stage 1: Connection Verification ....................................................... 791
6.2.5 Access Control, Stage 2: Request Verification ........................................................... 794
6.2.6 When Privilege Changes Take Effect ........................................................................ 795
6.2.7 Troubleshooting Problems Connecting to MySQL ....................................................... 796
6.3 MySQL User Account Management ..................................................................................... 801
6.3.1 User Names and Passwords ..................................................................................... 801
6.3.2 Adding User Accounts .............................................................................................. 802
6.3.3 Removing User Accounts ......................................................................................... 804
6.3.4 Setting Account Resource Limits ............................................................................... 804
6.3.5 Assigning Account Passwords ................................................................................... 806
6.3.6 Password Expiration and Sandbox Mode ................................................................... 808
6.3.7 Pluggable Authentication ........................................................................................... 810
6.3.8 Proxy Users ............................................................................................................. 813
6.3.9 SQL-Based MySQL Account Activity Auditing............................................................ 818
其余已有2013年版本翻译,年后更新
The text was updated successfully, but these errors were encountered: