What are the minimum privileges required for using mysqldump - mysql

I want to create mysql user with limited privileges to use only with mysqldump. What are minimum privileges that we can assign to user so he can just take dump and load databases or this requires admin rights ?
For now I have something like this working but I am not certain about the scope:
DROP user 'dumpuser'#'localhost' ;
FLUSH PRIVILEGES ;
GRANT SELECT ON mysql.proc TO 'dumpuser'#'localhost' IDENTIFIED BY 'dumppwd';
GRANT ALL ON dbname.* TO 'dumpuser'#'localhost' IDENTIFIED BY 'dumppwd';
FLUSH PRIVILEGES;
I want to further limit privilege scope if possible.

mysqldump requires at least the SELECT privilege for dumped tables,
SHOW VIEW for dumped views, TRIGGER for dumped triggers, and LOCK
TABLES if the --single-transaction option is not used. Certain options
might require other privileges as noted in the option descriptions.
From http://dev.mysql.com/doc/refman/5.1/en/mysqldump.html

Related

MySQL permissions to see all databases

I have a few users on my server who have access to every MySQL database. I'm trying to revoke privileges but I'm not sure how to go about it.
For example: I have a user bob who has access to every database on my server. I run the following to see which privileges bob has:
mysql -e "select * from information_schema.user_privileges;" | grep bob
'bob'#'%' def SELECT NO
'bob'#'%' def INSERT NO
'bob'#'%' def UPDATE NO
'bob'#'%' def DELETE NO
'bob'#'%' def CREATE NO
'bob'#'%' def FILE NO
'bob'#'%' def CREATE USER NO
Nothing jumps out like GRANT, ALL or SUPER. I create a new database sometest, switch to bob's account and see that bob has access to sometest. Not sure what I am missing here.
Edit: I ran SHOW GRANTS FOR 'bob'#'%'; and see:
GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, RELOAD, SHUTDOWN,
PROCESS, FILE, REFERENCES, INDEX, ALTER, SHOW DATABASES, CREATE TEMPORARY TABLES,
LOCK TABLES, EXECUTE, REPLICATION SLAVE, REPLICATION CLIENT, CREATE VIEW, SHOW VIEW,
CREATE ROUTINE, ALTER ROUTINE, CREATE USER, EVENT, TRIGGER, CREATE TABLESPACE
ON *.* TO 'bob'#'%'
1) How does one drop this permission? I assume if I run:
REVOKE SELECT, INSERT,... on *.* to 'bob'#'%';
it will remove permissions like
GRANT ALL ON bobsdb.* TO 'bob'#'%';
which I don't want to happen. But maybe it's best to just remove all privileges and build them back up from scratch.
2) How does one identify all permissions like this? Do I have to look over every user?
You should be able to view the users' grants using the command:
SHOW GRANTS FOR 'bob'#'localhost';
From the MySQL manual:
The SHOW DATABASES privilege enables the account to see database names by issuing the SHOW DATABASE statement. Accounts that do not have this privilege see only databases for which they have some privileges, and cannot use the statement at all if the server was started with the --skip-show-database option. Note that any global privilege is a privilege for the database.
If SHOW DATABASES is enabled, revoke that permission.
REVOKE SHOW DATABASES ON *.* FROM 'bob'#'localhost';
Lastly, reload all the privileges using the command:
FLUSH PRIVILEGES;
(or restart MySQL - if that's an option - often it's not).
P.S: You might need to replace 'localhost' with your db hostname.
Some references:
List of MySQL privileges
Revoke syntax
Flushing privileges
Edit:
To answer your questions:
1) How does one drop this permission? I assume if I run: REVOKE SELECT, INSERT,... on *.* to 'bob'#'%';
You could simply run REVOKE ALL ON *.* TO 'bob'#'%';
2) How does one identify all permissions like this? Do I have to look over every user?
See this blog post. Disclamer: I am not associated with this blog.

MySQL: When is Flush Privileges in MySQL really needed?

When creating new tables and a user to go along with it, I usually just invoke the following commands:
CREATE DATABASE mydb;
GRANT ALL PRIVILEGES ON mydb.* TO myuser#localhost IDENTIFIED BY "mypassword";
I have never ever needed to utilize the FLUSH PRIVILEGES command after issuing the previous two commands. Users can log in and use their database and run PHP scripts which connect to the database just fine. Yet I see this command used in almost every tutorial I look at.
When is the FLUSH PRIVILEGES command really needed and when is it unnecessary?
Privileges assigned through GRANT option do not need FLUSH PRIVILEGES to take effect - MySQL server will notice these changes and reload the grant tables immediately.
From MySQL documentation:
If you modify the grant tables directly using statements such as
INSERT, UPDATE, or DELETE, your changes have no effect on privilege
checking until you either restart the server or tell it to reload the
tables. If you change the grant tables directly but forget to reload
them, your changes have no effect until you restart the server. This
may leave you wondering why your changes seem to make no difference!
To tell the server to reload the grant tables, perform a
flush-privileges operation. This can be done by issuing a FLUSH
PRIVILEGES statement or by executing a mysqladmin flush-privileges or
mysqladmin reload command.
If you modify the grant tables indirectly using account-management
statements such as GRANT, REVOKE, SET PASSWORD, or RENAME USER, the
server notices these changes and loads the grant tables into memory
again immediately.
TL;DR
You should use FLUSH PRIVILEGES; only if you modify the grant tables directly using statements such as INSERT, UPDATE, or DELETE.
Just to give some examples. Let's say you modify the password for an user called 'alex'. You can modify this password in several ways. For instance:
mysql> update* user set password=PASSWORD('test!23') where user='alex';
mysql> flush privileges;
Here you used UPDATE. If you use INSERT, UPDATE or DELETE on grant tables directly you need use FLUSH PRIVILEGES in order to reload the grant tables.
Or you can modify the password like this:
mysql> set password for 'alex'#'localhost'= password('test!24');
Here it's not necesary to use "FLUSH PRIVILEGES;"
If you modify the grant tables indirectly using account-management statements such as GRANT, REVOKE, SET PASSWORD, or RENAME USER, the server notices these changes and loads the grant tables into memory again immediately.
2 points in addition to all other good answers:
1:
what are the Grant Tables?
from dev.mysql.com
The MySQL system database includes several grant tables that contain information about user accounts and the privileges held by them.
clarification: in MySQL, there are some inbuilt databases , one of them is "mysql" , all the tables on "mysql" database have been called as grant tables
2:
note that if you perform:
UPDATE a_grant_table SET password=PASSWORD('1234') WHERE test_col = 'test_val';
and refresh phpMyAdmin , you'll realize that your password has been changed on that table but even now if you perform:
mysql -u someuser -p
your access will be denied by your new password until you perform :
FLUSH PRIVILEGES;

Stop mySQL GRANT ALL, not just erasing

Imagine that I run this command:
GRANT ALL PRIVILEGES ON *.* TO 'user'#'host';
Now in every new DB, the user has full access.
The question is, imagine that at some point I want that those . privileges don't apply to new databases.
Is that possible?
I just thought about erasing user and GRANT privileges to the last db's created but it could be quite hard if there are a lot of them... and I wondered if there was a "REVOKE from now on ..." hidden from google command.
Try this, it helped me may be you too
REVOKE ALL on dbName.* from 'user'#'host';
FLUSH PRIVILEGES;
try this:
REVOKE ALL PRIVILEGES ON *.* FROM user [, user] ...
REVOKE GRANT OPTION ON *.* FROM user [, user] ...
https://dev.mysql.com/doc/refman/4.1/en/revoke.html
maybe you should try this
REVOKE [type of permission] ON [database name].[table name] FROM ‘[username]’#‘localhost’;
ALL PRIVILEGES- this would allow a MySQL user all access to a designated database (or if no database is selected, across the system)
CREATE- allows them to create new tables or databases
DROP- allows them to them to delete tables or databases
DELETE- allows them to delete rows from tables
INSERT- allows them to insert rows into tables
SELECT- allows them to use the Select command to read through databases
UPDATE- allow them to update table rows
https://www.digitalocean.com/community/articles/how-to-create-a-new-user-and-grant-permissions-in-mysql

mysql - How to grant read only permissions to a user?

I have a mysql user, whom I want to grant all the READ permission on a db schema.
One way is this :
GRANT SELECT, SHOW_VIEW ON test.* TO 'readuser'#'%';
Is there a way to group all read operations in grant ?
If there is any single privilege that stands for ALL READ operations on database.
It depends on how you define "all read."
"Reading" from tables and views is the SELECT privilege. If that's what you mean by "all read" then yes:
GRANT SELECT ON *.* TO 'username'#'host_or_wildcard' IDENTIFIED BY 'password';
However, it sounds like you mean an ability to "see" everything, to "look but not touch." So, here are the other kinds of reading that come to mind:
"Reading" the definition of views is the SHOW VIEW privilege.
"Reading" the list of currently-executing queries by other users is the PROCESS privilege.
"Reading" the current replication state is the REPLICATION CLIENT privilege.
Note that any or all of these might expose more information than you intend to expose, depending on the nature of the user in question.
If that's the reading you want to do, you can combine any of those (or any other of the available privileges) in a single GRANT statement.
GRANT SELECT, SHOW VIEW, PROCESS, REPLICATION CLIENT ON *.* TO ...
However, there is no single privilege that grants some subset of other privileges, which is what it sounds like you are asking.
If you are doing things manually and looking for an easier way to go about this without needing to remember the exact grant you typically make for a certain class of user, you can look up the statement to regenerate a comparable user's grants, and change it around to create a new user with similar privileges:
mysql> SHOW GRANTS FOR 'not_leet'#'localhost';
+------------------------------------------------------------------------------------------------------------------------------------+
| Grants for not_leet#localhost |
+------------------------------------------------------------------------------------------------------------------------------------+
| GRANT SELECT, REPLICATION CLIENT ON *.* TO 'not_leet'#'localhost' IDENTIFIED BY PASSWORD '*xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' |
+------------------------------------------------------------------------------------------------------------------------------------+
1 row in set (0.00 sec)
Changing 'not_leet' and 'localhost' to match the new user you want to add, along with the password, will result in a reusable GRANT statement to create a new user.
Of, if you want a single operation to set up and grant the limited set of privileges to users, and perhaps remove any unmerited privileges, that can be done by creating a stored procedure that encapsulates everything that you want to do. Within the body of the procedure, you'd build the GRANT statement with dynamic SQL and/or directly manipulate the grant tables themselves.
In this recent question on Database Administrators, the poster wanted the ability for an unprivileged user to modify other users, which of course is not something that can normally be done -- a user that can modify other users is, pretty much by definition, not an unprivileged user -- however -- stored procedures provided a good solution in that case, because they run with the security context of their DEFINER user, allowing anybody with EXECUTE privilege on the procedure to temporarily assume escalated privileges to allow them to do the specific things the procedure accomplishes.
GRANT SELECT ON *.* TO 'user'#'localhost' IDENTIFIED BY 'password';
This will create a user with SELECT privilege for all database including Views.
Note for MySQL 8 it's different
You need to do it in two steps:
CREATE USER 'readonly_user'#'localhost' IDENTIFIED BY 'some_strong_password';
GRANT SELECT, SHOW VIEW ON *.* TO 'readonly_user'#'localhost';
flush privileges;
Various permissions that you can grant to a user are
ALL PRIVILEGES- This would allow a MySQL user all access to a designated database (or if no database is selected, across the system)
CREATE- allows them to create new tables or databases
DROP- allows them to them to delete tables or databases
DELETE- allows them to delete rows from tables
INSERT- allows them to insert rows into tables
SELECT- allows them to use the Select command to read through databases
UPDATE- allow them to update table rows
GRANT OPTION- allows them to grant or remove other users' privileges
To provide a specific user with a permission, you can use this framework:
GRANT [type of permission] ON [database name].[table name] TO ‘[username]’#'localhost’;
I found this article very helpful
A step by step guide I found here.
To create a read-only database user account for MySQL
At a UNIX prompt, run the MySQL command-line program, and log in as an administrator by typing the following command:
mysql -u root -p
Type the password for the root account.
At the mysql prompt, do one of the following steps:
To give the user access to the database from any host, type the following command:
grant select on database_name.* to 'read-only_user_name'#'%' identified by 'password';
If the collector will be installed on the same host as the database, type the following command:
grant select on database_name.* to 'read-only_user_name' identified by 'password';
This command gives the user read-only access to the database from the local host only.
If you know the host name or IP address of the host that the collector is will be installed on, type the following command:
grant select on database_name.* to 'read-only_user_name'#'host_name or IP_address' identified by 'password';
The host name must be resolvable by DNS or by the local hosts file.
At the mysql prompt, type the following command:
flush privileges;
Type quit.
The following is a list of example commands and confirmation messages:
mysql> grant select on dbname.* to 'readonlyuser'#'%' identified
by 'pogo$23';
Query OK, 0 rows affected (0.11 sec)
mysql> flush privileges;
Query OK, 0 rows affected (0.00 sec)
mysql> quit
Even user has got answer and #Michael - sqlbot has covered mostly points very well in his post but one point is missing, so just trying to cover it.
If you want to provide read permission to a simple user (Not admin kind of)-
GRANT SELECT, EXECUTE ON DB_NAME.* TO 'user'#'localhost' IDENTIFIED BY 'PASSWORD';
Note: EXECUTE is required here, so that user can read data if there is a stored procedure which produce a report (have few select statements).
Replace localhost with specific IP from which user will connect to DB.
Additional Read Permissions are-
SHOW VIEW : If you want to show view schema.
REPLICATION CLIENT : If user need to check replication/slave status.
But need to give permission on all DB.
PROCESS : If user need to check running process. Will work with all
DB only.
If you want the view to be read only after granting the read permission you can use the ALGORITHM = TEMPTABLE in you view DDL definition.
solution: here's some useful cookbook for creating a readonly user on mysql.
# 1. connect as an admin on database / cluster
mysql -u root -h mydb.123456789012.us-east-1.rds.amazonaws.com
# 2. create user protected with strong password with global access ('%') or local access ('localhost')
mysql> CREATE USER 'ro_user'#'%' IDENTIFIED BY 'abcd1234%^&#';
# 3. grant SELECT privileges for relevant user
mysql> GRANT SELECT ON *.* TO 'ro_user'#'%' WITH GRANT OPTION;
# 4. reload grant tables on database
mysql> FLUSH PRIVILEGES;
# 5. verify grant are placed as expected
mysql> show grants for 'ro_user'#'%';
// output:
// +------------------------------------------------------+
// | Grants for ro_user#% |
// +------------------------------------------------------+
// | GRANT SELECT ON *.* TO 'ro_user'#'%' WITH GRANT OPTION |
// +------------------------------------------------------+
// 1 row in set (0.00 sec)
mysql> exit

New user has all privileges in MySQL 5.6

I have a problem when I create a new user in mySQL 5.6
What I want:
When I create the new user, it doesn't have any privileges, and I just want to grant some select and update in a few specific columns. So he should be able to update just anything at all the DB. Sounds fair.
So, first, I create a new user:
CREATE USER 'newuser'#'%' IDENTIFIED BY 'password';
After this, I log in with my new user and when I do a show grants; command I have this:
GRANT USAGE ON *.* TO 'newuser'#'%' IDENTIFIED BY PASSWORD '*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19'
So in my theory he cant do anything in my database bacause he doesn't have any GRANT SELECT privilege.
But when I do a select in my test table he can view all columns and all results. He can update ... and do everything he wants to. It's like he have a GRANT SELECT,UPDATE,DELETE ... ON *.* TO 'newuser'#'%' but I can't revoke that because he doesn't have that.
Of course, I've tried to revoke all privileges, but I can't because he doesn't have any privileges.
I hope i'm clear. So I'm confused, any ideas?
Thanks!
Clément
In many default installations, all users have all privileges on tables within any database called test or beginning with test_.
From http://dev.mysql.com/doc/refman/5.6/en/default-privileges.html#idp5999952 :
By default, the mysql.db table contains rows that permit access by any user to the test database and other databases with names that start with test_. ...If you want to remove any-user access to test databases, do so as follows:
mysql> DELETE FROM mysql.db WHERE Db LIKE 'test%';
mysql> FLUSH PRIVILEGES;
Alternatively, make sure that your test table isn't in a database with such a name, and then you'll see the true behaviour.