Showing entries 81 to 90 of 511
« 10 Newer Entries | 10 Older Entries »
Displaying posts with tag: Security (reset)
MariaDB 10.3.15, MariaDB Connector/C 3.0.10, MariaDB Connector/Node.js 2.0.5 and MariaDB Connector/ODBC 3.1.1 Now Available

The MariaDB Foundation is pleased to announce the availability of MariaDB 10.3.15, the latest stable release in the MariaDB 10.3 series, as well as MariaDB Connector/C 3.0.10, MariaDB Connector/ODBC 3.1.1 and MariaDB Connector/Node.js 2.0.5, the latest MariaDB Connector releases. See the release notes and changelogs for details. Download MariaDB 10.3.15 Release Notes Changelog What is […]

The post MariaDB 10.3.15, MariaDB Connector/C 3.0.10, MariaDB Connector/Node.js 2.0.5 and MariaDB Connector/ODBC 3.1.1 Now Available appeared first on MariaDB.org.

Not enforcing SSL on CloudSQL, really !

When creating a MySQL CloudSQL instance, SSL connections are not enforced by default and you get below in the Connections tab of the Google Cloud Platform console.  Is this a problem ?  Some people might think no, but I do not agree with them.  And if I am writing this post, you can probably guess that there is a lot to say about this subject.  Read on for the details.

When creating a MySQL

MySQL8 Cluster and Networking Problems

This is my second post on the topic of reliable MySQL8 cluster. Hopefully the last one as things look much brighter now. In my previous post about MySQL8 and building an InnoDB cluster, I’ve described the overall design of the KeyChest backend. This has been running well for a couple of weeks till a network

The post MySQL8 Cluster and Networking Problems appeared first on Magic of Security.

Partial Revokes from Database Objects

This is a 3 part blog series:

Have you ever encountered situations where you want to grant a user access to all databases except a few databases ? …

Facebook Twitter Google+ LinkedIn

The SYSTEM_USER Dynamic Privilege

This is a 3 part blog series:

To modify users, you must have the CREATE USER privilege or the UPDATE privilege on the mysql schema.…

Facebook Twitter Google+ LinkedIn

How to create multiple accounts for an app?

This is a 3 part blog series:

You can now grant CREATE USER so that your web apps would be able to use multiple accounts without you risking the end user hijacking the database by changing your root credentials for example.  …

Facebook Twitter Google+ LinkedIn

MySQL-python: Adding caching_sha2_password and TLSv1.2 Support

Python 2 reaches EOL on 2020-01-01 and one of its commonly used third-party packages is MySQL-python. If you have not yet migrated away from both of these, since MySQL-python does not support Python 3, then you may have come across some issues if you are using more recent versions of MySQL and are enforcing a secured installation. This post will look at two specific issues that you may come across (caching_sha2_password in MySQL 8.0 and TLSv1.2 with MySQL >=5.7.10 when using OpenSSL) that will prevent you from connecting to a MySQL database and buy …

[Read more]
MYSQL8 and InnoDB Cluster

Some time ago, we decided to run KeyChest on a database cluster. Once we actually did it, I started doubting wisdom of this decision and it took a few months to get beyond the stability of a single-node MySQL database. I’ve written a blog post that the encryption should be just as simple as databases

The post MYSQL8 and InnoDB Cluster appeared first on Magic of Security.

Authentication in MariaDB 10.4 — Understanding the Changes

MariaDB Server 10.4 came with a whole lot of Security related changes. Some of them are merely optimizations (like MDEV-15649), some improve existing features to be more robust (MDEV-15473, MDEV-7598) or convenient (MDEV-12835, MDEV-16266). Some are MySQL compatibility features, requested by our users (MDEV-7597, MDEV-13095). But the first thing any MariaDB Server user, whether an […]

The post Authentication in MariaDB 10.4 — Understanding the Changes appeared first on MariaDB.org.

MySQL Security – MySQL Enterprise Data Masking and De-Identification

MySQL Enterprise Data Masking and De-Identification hides sensitive information by replacing real values with substitutes in order to protect sensitive data while they are still look real and consistent.

Showing entries 81 to 90 of 511
« 10 Newer Entries | 10 Older Entries »