Changing Permissions for Accounts
Scenarios
You can authorize custom database users to specified databases and revoke permissions for authorized databases.
Constraints
- This operation is not allowed when another operation is being performed on your DB instance.
- Take care when changing account permissions. Inappropriately configured account permissions can impact the DB instance or workloads.
Procedure
- Log in to the management console.
- Click
in the upper left corner and select a region and project.
- Click
in the upper left corner of the page and choose Databases > TaurusDB.
- On the Instances page, click the instance name.
- In the navigation pane, choose Accounts. On the displayed page, locate the target account and choose More > Change Permission in the Operation column.
- In the displayed dialog box, change account permissions.
Select one or more unauthorized databases and authorize their permissions to the account. To delete a selected database, locate the database and click × in the Operation column.
Table 1 lists the read-only and read/write SQL permissions.Table 1 Permissions Permission Type
Permission
Read-only
GRANT SELECT, LOCK TABLES, and SHOW VIEW
Read/Write
GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, REFERENCES, INDEX, ALTER, CREATE TEMPORARY TABLES, LOCK TABLES, EXECUTE, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE, EVENT, and TRIGGER
Figure 1 Changing permissions - On the Accounts page, check that the authorized databases and permissions of the account have been changed.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot