Difference between revisions of "MySQL Users and Security"

From Techotopia
Jump to: navigation, search
(New page: In today's information based society nothing is more valuable than information. Today, that information is almost certainly stored in a database of some form or another. Whether it is a co...)
 
(Getting Information About Users)
Line 10: Line 10:
  
 
The first step securing a database is to find out which users already have access. This information is stored, not suprisingly, in a MySQL database called ''mysql''.
 
The first step securing a database is to find out which users already have access. This information is stored, not suprisingly, in a MySQL database called ''mysql''.
 +
 +
The mysql database contains a table called ''user'' which in turn contains a number of columns including the user login name and the users various privileges and connection rights. To obtain a list of users run the following command:
 +
 +
<pre>
 +
SELECT user FROM user;
 +
</pre>
 +
 +
A newly installed MySQL database will only list one user, the root user:
 +
 +
<pre>
 +
mysql> select user from user;
 +
+----------+
 +
| user    |
 +
+----------+
 +
| root    |
 +
+----------+
 +
7 rows in set (0.
 +
</pre>
 +
 +
A database that is more established will likely contain more users, some of which will have been manually created, and others, in the cvase below, created as a result of installing a third-party which uses MySQL
 +
 +
<pre>
 +
mysql> select user from user;
 +
+----------+
 +
| user    |
 +
+----------+
 +
| remote  |
 +
|          |
 +
| phptest  |
 +
| root    |
 +
| wikiuser |
 +
|          |
 +
| root    |
 +
+----------+
 +
7 rows in set (0.00 sec)
 +
</pre>
 +
 +
== Creating a New MySQL User ==
 +
 +
== Deleting a MySQL User ==
 +
 +
== Renaming a MySQL User ==
 +
 +
== Changing the Password for a MySQL User ==

Revision as of 20:40, 27 October 2007

In today's information based society nothing is more valuable than information. Today, that information is almost certainly stored in a database of some form or another. Whether it is a corporate sales database, a customer credit card database, or a table containing a list of names and social security numbers, there is a good chance that there are people out there who would love to get access to that data. It is for this reason that it is vital that a MySQL database be kept secure.

In this chapter we will provide an overview of securing user access to MySQL based databases.


Contents


MySQL Security

MySQL security works by limiting both the users who have access to a database and what they are allowed to do once that have access. This requires careful consideration of issues such as who is allowed to read from or write to particular database tables and which users have permission to delete tables or use other MySQL features.

Getting Information About Users

The first step securing a database is to find out which users already have access. This information is stored, not suprisingly, in a MySQL database called mysql.

The mysql database contains a table called user which in turn contains a number of columns including the user login name and the users various privileges and connection rights. To obtain a list of users run the following command:

SELECT user FROM user;

A newly installed MySQL database will only list one user, the root user:

mysql> select user from user;
+----------+
| user     |
+----------+
| root     |
+----------+
7 rows in set (0.

A database that is more established will likely contain more users, some of which will have been manually created, and others, in the cvase below, created as a result of installing a third-party which uses MySQL

mysql> select user from user;
+----------+
| user     |
+----------+
| remote   |
|          |
| phptest  |
| root     |
| wikiuser |
|          |
| root     |
+----------+
7 rows in set (0.00 sec)

Creating a New MySQL User

Deleting a MySQL User

Renaming a MySQL User

Changing the Password for a MySQL User