Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Advanced MySQL 8

You're reading from   Advanced MySQL 8 Discover the full potential of MySQL and ensure high performance of your database

Arrow left icon
Product type Paperback
Published in Jan 2019
Publisher
ISBN-13 9781788834445
Length 286 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Birju Shah Birju Shah
Author Profile Icon Birju Shah
Birju Shah
Eric Vanier Eric Vanier
Author Profile Icon Eric Vanier
Eric Vanier
Tejaswi Malepati Tejaswi Malepati
Author Profile Icon Tejaswi Malepati
Tejaswi Malepati
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Introduction 2. MySQL 8's New Features FREE CHAPTER 3. Indexing Your Data for High Performance 4. Advanced Data Techniques for Large Queries 5. MySQL Data Dictionary in MySQL 8.0 6. MySQL Server Settings 7. Group Replication in MySQL 8.0 8. InnoDB Cluster in MySQL 8.0 9. Monitoring Your Large Distributed Databases 10. Authentication and Security Management with MySQL 8.0 11. Advanced MySQL Performance Tips and Techniques 12. Other Books You May Enjoy

MySQL 8.0 security features

MySQL 8.0 is continuing in the same vein as that set by MySQL 5.7—to be secure by default. The Oracle MySQL development team has added a number of interesting security features, including, SQL roles, making the ACL statements atomic, and also dynamic global privileges.

Another aspect that has been improved is the keyring API.

New MySQL 8.0 roles will give you better access controls:

  • An easy way to manage user and application rights
  • As compliant with standards as is feasible in practice
  • Multiple default roles

MySQL 8.0 provides a better way to have administrative-level access controls with dynamic privileges:

  • Too often, super privileges are given for tasks when fewer privileges are actually required.
  • These are needed to allow the addition of administrative access controls.

Examples of the new components include the following:

  • Replication
  • ...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime