一、介紹
如果數據庫被黑客SQL注入得到數據庫用戶名和密碼,可以只設置指定用戶IP地址可以操作數據庫,可以防止黑客拖庫
二、使用方法
語法: grant priv_type on mysql.user to 'user'@'host' identified by 'password' with grant option; priv_type:代表允許操作數據庫的權限 user:代表數據庫用戶名 host:代表IP地址 password:代表設置的密碼
刷新user權限表:flush privileges;
三、案例
1.設置所有數據庫、所有表、任意ip可以連接數據庫,授權給用戶名ping並設置密碼為123456
grant all on *.* to 'ping'@'%' identified by '123456'; flush privileges;
2.授權表cloud的記錄修改權限給連接ip地址是192.168.100.1和用戶名是ping並且密碼為123456
grant update(name,sex) on cloud to 'ping'@'192.168.100.1' identified by '123456'; flush privileges;
四、查看數據庫權限表
mysql> select * from mysql.user where host='localhost'\G;
*************************** 1. row ***************************
Host: localhost
User:
Password:
Select_priv: N
Insert_priv: N
Update_priv: N
Delete_priv: N
Create_priv: N
Drop_priv: N
Reload_priv: N
Shutdown_priv: N
Process_priv: N
File_priv: N
Grant_priv: N
References_priv: N
Index_priv: N
Alter_priv: N
Show_db_priv: N
Super_priv: N
Create_tmp_table_priv: N
Lock_tables_priv: N
Execute_priv: N
Repl_slave_priv: N
Repl_client_priv: N
Create_view_priv: N
Show_view_priv: N
Create_routine_priv: N
Alter_routine_priv: N
Create_user_priv: N
Event_priv: N
Trigger_priv: N
ssl_type:
ssl_cipher:
x509_issuer:
x509_subject:
max_questions: 0
max_updates: 0
max_connections: 0
max_user_connections: 0
