In this chapter, we will cover the following recipes:
- Securing installation
- Restricting networks and users
- Password-less authentication using mysql_config_editor
- Resetting the root password
- Setting up encrypted connections using X509
- Setting up SSL replication