Mass user creation On our servers is used the convention, that each of user has only one database, which has the same name, as the user itself. This method.

Slides:



Advertisements
Similar presentations
PHP SQL. Connection code:- mysql_connect("server", "username", "password"); Connect to the Database Server with the authorised user and password. Eg $connect.
Advertisements

AD User Import From SIMS.NET
MySQL Access Privilege System
© 2012 Entrinsik, Inc. Informer Administration Exploring the system menu and functions PRESENTER: Jason Vorenkamp| Informer Software Engineer| March 2012.
What is MySQL? MySQL is a relational database management system (A relational database stores data in separate tables rather than putting all the data.
Quick-and-dirty.  Commands end in a semi-colon ◦ If you forget, another prompt line shows up  Either continue the command or…  End it with a semi-colon.
Chapter 9 Auditing Database Activities
NIS Consistent configuration across the network. Why NIS? Primary reason is to provide same user configuration across the network Users go any machine.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
27-Jun-15 Rails. What is Rails? Rails is a framework for building web applications This involves: Getting information from the user (client), using HTML.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Guide to Linux Installation and Administration, 2e1 Chapter 6 Using the Shell and Text Files.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
1 Client/Server Database Tutorial. SQL Server Connection through MS Access FACBUSAD1 SQL server MS Access MGD B106 Computer or your own PC Remote SQL.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
1 Working with MS SQL Server. 2 Objectives You will be able to Use Visual Studio for GUI based interactive access to a Microsoft SQL Server database.
Databases with PHP A quick introduction. Y’all know SQL and Databases  You put data in  You get data out  You can do processing on it very easily 
Session 5: Working with MySQL iNET Academy Open Source Web Development.
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
MySQL + PHP.  Introduction Before you actually start building your database scripts, you must have a database to place information into and read it from.
An introduction to SQL 1/21/2014 – See chapter 2.3 and 6.1 PostgreSQL -
Ext Environment Copyright © 2005 Liferay, LLC All Rights Reserved. No material may be reproduced electronically or in print without written permission.
Chapter 7 Working with Databases and MySQL PHP Programming with MySQL 2 nd Edition.
Chapter 7 Working with Databases and MySQL PHP Programming with MySQL 2 nd Edition.
Ways to manage DB in MySQL cs346. Six ways to CREATE and INSERT INTO tables Modelocalremotelocalremotewindow WhereMysql console Putty; Mysql console Mysql.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Working with MSSQL Server Code:G0-C# Version: 1.0 Author: Pham Trung Hai CTD.
ITN Wake Tech1 ITN270 Advanced Internet Databases Lecture 15. General MySQL Administration Topics: –Securing a New MySQL Installation –MySQL Server.
Web Scripting [PHP] CIS166AE Wednesdays 6:00pm – 9:50pm Rob Loy.
MySQL Databases & PHP Integration Using PHP to write data to, and retrieve data from, a MySQL database.
Introduction to Derby. RHS – What is Derby…? Derby is a DBMS –Database –GUI for administration –GUI for data maintenance Best part; integrated.
MySQL Database Connection
Plant Accession Application Maintenance Manual. Accession Application Website Environment Overview WinHost.com ASP Pages VBScript Procs Constants Style.
Chapter 5 MYSQL Database. Introduction to MYSQL MySQL is the world's most popular open-source database. Open source means that the source code, the programming.
MySQL Database Management Systems Universitas Muhammadiyah Surakarta Yogiek Indra Kurniawan.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Telnet allows you to log in remotely to other computers connected to the Internet (but only computers that are set up to be logged in to). Once logged.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
CMap Version 0.16 Ben Faga. CMap CMap Version 0.16 Bug fixes and code optimizations More intuitive menu system Asynchronous loading of comparative map.
DATA BASE ADMINISTRING DATABASE SERVICES IN RED HAT LINUX.
Database MySQL Universitas Muhammadiyah Surakarta Yogiek Indra Kurniawan.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
WAMP Server Installatin Shiyun Wen. WAMP Server Installation  WAMP Server is an integrated installation of Apache, MySQL, and PHP for Windows. Following.
Agenda for Class 2/20/2014 Introduce Microsoft’s SQL Server database management system. Use the lab to discuss how to CREATE, DROP and populate (INSERT)
Data Mining Instructor: Dr C. C. Chan Presented by Uday Seelam.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
VIRTUAL HOSTING WITH PureFTPd And MYSQL (Quota And Bandwidth Management) BY Odoh Kenneth Emeka Sun Yu Patrick Appiah.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Dr. Chen, Oracle Database System (Oracle) 1 Chapter 7 User Creation and Management Jason C. H. Chen, Ph.D. Professor of MIS School of Business Gonzaga.
Lab 3.21 MySQL Database Lab Developing the Tools May 5 th, 2004 Montréal, Québec Dominik Gehl Hôpital Ste-Justine, Montréal.
Settings MySQL Database and JDBC configuration Instructor: Sergey Goldman.
Software-Projekt 2008 Seminarvortrag“Short tutorial of MySql“ Wei Chen Verena Honsel.
Slide Set #24: Database security SY306 Web and Databases for Cyber Operations.
DBMS Programs MS SQL Server & MySQL
First Day in Lab Making a C++ program
SUSE Linux Enterprise Desktop Administration
Open Source Server Side Scripting Permissions & Users
Managing Software.
Chapter 7 Working with Databases and MySQL
Chapter 8 Working with Databases and MySQL
MSIS 655 Advanced Business Applications Programming
8 6 MySQL Special Topics A Guide to MySQL.
Tutorial 6 PHP & MySQL Li Xu
First Level Incident Handling FAQ (For EAL)
Presentation transcript:

Mass user creation On our servers is used the convention, that each of user has only one database, which has the same name, as the user itself. This method is very popular. It can be done by following method: 1) create a text file with many lines similar as the next example: CREATE DATABASE alik character set = cp1250 ; GRANT ALL PRIVILEGES ON alik.* TO 'novak’ IDENTIFIED BY 'autobus' ; The first line will create database itself. The second line will grant rights to this database to specified user. Rights should be separated by comma: SELECT, INSERT, ALTER, CREATE, DELETE... or you can use "ALL PRIVILEGES" and then use "REVOKE" Note: if the user doesn’t exist, it will be created. As a result of the IDENTIFIED BY keyword, password of this user will be changed. MySQL ver. 4

MySQL from version 5.0 From this version, you have to use the password function to change user’s password. As a result, you need three commands per user: 1) create database: CREATE DATABASE alik character set = cp1250 ; 2) grant rights to non-existing user will create him/her: GRANT ALL PRIVILEGES ON alik.* TO 'novak’ ; 3) set a password for this user: SET PASSWORD FOR novak = password('autobus') ; Instead of ALL PRIVILEGES can be (again) list of rights. For specific user, you can grant the SELECT right only. Even for version 4, passwords have been coded, but this has been done without asking. Note: uppercase and lowercase can be mixed without any problem.

Example of the file: The next file has been created using Excel. If each part of command is in a cell, in text export it will be separated by tabs (for MySQL, it is O.K.). MySQL ver. 4

For import of this file, lunch (execute) the MySQL Command Line Client. In this console, script can be imported by use of the "source" command: mysql> source c:\any_name.txt This is important to prepare this file in such directory, that the name including path can be easy written (the desktop address is very complicated to be written). Note: in the Windows XP command line prompt, you cannot use the Ctrl+C and Ctrl+V commands. Using Linux and the “putty” program, you can use older Ctrl+Insert and Shift+Insert instead of this.

The result of executing file with three pairs:

If there are demand for supervising, we can simply create similar file, but the rights to the database will be granted to specific user (in this case, we don't like to change the user's password): GRANT ALL PRIVILEGES ON alik.* TO 'kral' ; GRANT ALL PRIVILEGES ON bart.* TO 'kral' ; GRANT ALL PRIVILEGES ON haryk.* TO 'kral' ; GRANT ALL PRIVILEGES ON rex.* TO 'kral' ; For this purpose, the "SELECT" right will be enough.

Example of the file created by Excel: After executing, we can try to use the selected account ('kral') to explore databases...

Don't forget to leave the "Database" empty when logging into, in other cases you can explore just this database:

You can use the Micka client for maintaining the database, if you use this client locally (the address should be "localhost") with the "root" as user and the password for the command line client when login (use of the "root" user is typically limited to use on the localhost connection; can be allowed in the system configuration files). From the "user" table you can get a list of users by: SELECT user.User FROM user; or from the database list (the "db" table): SELECT User FROM db; (assuming database with the name “MySQL” has been selected; in the command line, type “use mysql”.)

Micka after root by localhost connection:

All the maintenance can be done from the command line client. Note the last two commands ("use" will open the database, then we can use "select"):

The result is little unreadable (passwords have been masked) :

Setting of the user password: Password is coded, so you have to use the "password" function. The first line will connect (open) the database containing the user definition, the second command will change the password. Note, that passwords are in the cache – to change this, you have to free all caches to force them to reload (the last line): USE mysql; UPDATE user SET Password = PASSWORD('newpwd') WHERE User = 'kral'; FLUSH PRIVILEGES;