MySQL 8.0.18 adds users to the database and grants permissions

MySQL 8.0.18 adds users to the database and grants permissions

1. It is preferred to use the root user to log in to the database

mysql -uroot -p

2. Using MySQL database

USE mysql;

3. Create a user for mysql: dev Password: dev12345

CREATE USER dev IDENTIFIED BY 'dev12345';

4. Check the permissions of user dev

SELECT * FROM user WHERE user='dev';
SHOW GRANTS FOR dev;

5. Assign EXECUTE (execute stored procedure), INSERT, SELECT, and UPDATE permissions to user dev on the database named dev_db. @'%' means that this database can be accessed from any IP address.

GRANT EXECUTE,INSERT,SELECT,UPDATE ON dev_db.* TO 'dev'@'%';
FLUSH PRIVILEGES;

6. Query the permissions again

SELECT * FROM USER WHERE USER='dev_dv';
SHOW GRANTS FOR dev;

Summarize

The above is what I introduced to you about adding users and granting permissions to the database in MySQL 8.0.18. I hope it will be helpful to you. If you have any questions, please leave me a message and I will reply to you in time. I would also like to thank everyone for their support of the 123WORDPRESS.COM website!
If you find this article helpful, please feel free to reprint it and please indicate the source. Thank you!

You may also be interested in:
  • mysql create database, add users, user authorization practical method
  • MySql installation and configuration method (MySQL add users, delete users and authorization)
  • Specific implementation of adding users and assigning permissions to MySQL database
  • MYSQL basics: connect to MYSQL, change password, add user
  • Introduction to adding new users to MySql, creating databases for users, and assigning permissions to users

<<:  Detailed explanation of script debugging mechanism in bash

>>:  The vue configuration file automatically generates routing and menu instance code

Recommend

Based on the special characters in the URL escape encoding

Table of contents Special characters in URLs URL ...

Solution for using Baidu share on Https page

Since enabling https access for the entire site, ...

Use of marker tags in CSS list model

This article mainly introduces the ::master pseud...

In-depth analysis of the Identifier Case Sensitivity problem in MySQL

In MySQL, you may encounter the problem of case s...

How to create a file system in a Linux partition or logical volume

Preface Learn to create a file system on your sys...

How a select statement is executed in MySQL

Table of contents 1. Analyzing MySQL from a macro...

Deploy Confluence with Docker

1. Environmental requirements 1. Docker 17 and ab...

Modify the boot time of grub in ubuntu

The online search to modify the grub startup time...

Solution to mysql error when modifying sql_mode

Table of contents A murder caused by ERR 1067 The...

How to move a red rectangle with the mouse in Linux character terminal

Everything is a file! UNIX has already said it. E...

JavaScript to implement mobile signature function

This article shares the specific code of JavaScri...

Example of how to check the capacity of MySQL database table

This article introduces the command statements fo...

Detailed explanation of count(), group by, order by in MySQL

I recently encountered a problem when doing IM, a...