在MySQL中,如何查看一个用户被授予了那些权限呢? 授予用户的权限可能分全局层级权限、数据库层级权限、表层级别权限、列层级别权限、子程序层级权限。具体分类如下:

 

 

全局层级

 

全局权限适用于一个给定服务器中的所有数据库。这些权限存储在mysql.user表中。GRANT ALL ON *.*和REVOKE ALL ON *.*只授予和撤销全局权限。

 

数据库层级

 

数据库权限适用于一个给定数据库中的所有目标。这些权限存储在mysql.db和mysql.host表中。GRANT ALL ON db_name.*和REVOKE ALL ON db_name.*只授予和撤销数据库权限。

    

表层级

 

表权限适用于一个给定表中的所有列。这些权限存储在mysql.tables_priv表中。GRANT ALL ON db_name.tbl_name和REVOKE ALL ON db_name.tbl_name只授予和撤销表权限。

 

列层级

 

列权限适用于一个给定表中的单一列。这些权限存储在mysql.columns_priv表中。当使用REVOKE时,您必须指定与被授权列相同的列。

 

子程序层级

 

CREATE ROUTINE, ALTER ROUTINE, EXECUTE和GRANT权限适用于已存储的子程序。这些权限可以被授予为全局层级和数据库层级。而且,除了CREATE ROUTINE外,这些权限可以被授予为子程序层级,并存储在mysql.procs_priv表中。

 

 

 

1:那么我们来创建一个测试账号test,授予全局层级的权限。如下所示: 

 

  1. mysql> grant select,insert on *.* to test@\'%\' identified by \'test\';
  1. Query OK, 0 rows affected (0.01 sec)
  1.  
  1. mysql> flush privileges;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql>

 

 

那么可以用下面两种方式查询授予test的权限。如下所示:

 

 

  1. mysql> show grants for test;
  1. +--------------------------------------------------------------------------------------------------------------+
  1. | Grants for test@%                                                                                            |
  1. +--------------------------------------------------------------------------------------------------------------+
  1. | GRANT SELECT, INSERT ON *.* TO \'test\'@\'%\' IDENTIFIED BY PASSWORD \'*94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29\' |
  1. +--------------------------------------------------------------------------------------------------------------+
  1. 1 row in set (0.00 sec)
  1.  
  1. mysql> select * from mysql.user where user=\'test\'\G;
  1. *************************** 1. row ***************************
  1.                   Host: %
  1.                   User: test
  1.               Password: *94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29
  1.            Select_priv: Y
  1.            Insert_priv: Y
  1.            Update_priv: N
  1.            Delete_priv: N
  1.            Create_priv: N
  1.              Drop_priv: N
  1.            Reload_priv: N
  1.          Shutdown_priv: N
  1.           Process_priv: N
  1.              File_priv: N
  1.             Grant_priv: N
  1.        References_priv: N
  1.             Index_priv: N
  1.             Alter_priv: N
  1.           Show_db_priv: N
  1.             Super_priv: N
  1. Create_tmp_table_priv: N
  1.       Lock_tables_priv: N
  1.           Execute_priv: N
  1.        Repl_slave_priv: N
  1.       Repl_client_priv: N
  1.       Create_view_priv: N
  1.         Show_view_priv: N
  1.    Create_routine_priv: N
  1.     Alter_routine_priv: N
  1.       Create_user_priv: N
  1.             Event_priv: N
  1.           Trigger_priv: N
  1. Create_tablespace_priv: N
  1.               ssl_type:
  1.             ssl_cipher:
  1.            x509_issuer:
  1.           x509_subject:
  1.          max_questions: 0
  1.            max_updates: 0
  1.        max_connections: 0
  1.   max_user_connections: 0
  1.                 plugin: mysql_native_password
  1. authentication_string:
  1.       password_expired: N
  1. 1 row in set (0.04 sec)
  1.  
  1. ERROR:
  1. No query specified
  1.  
  1. mysql>

 

clip_image001

 

 

 

 

2:那么我们来创建一个测试账号test,授予数据库层级的权限。如下所示:

 

  1. mysql> drop user test;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> grant select,insert,update,delete on MyDB.* to test@\'%\' identified by \'test\';
  1. Query OK, 0 rows affected (0.01 sec)
  1.  
  1. mysql>
  1.  
  1. mysql> select * from mysql.user where user=\'test\'\G; --可以看到无任何授权。
  1. mysql> select * from mysql.db where user=\'test\'\G;
  1. *************************** 1. row ***************************
  1.                  Host: %
  1.                    Db: MyDB
  1.                  User: test
  1.           Select_priv: Y
  1.           Insert_priv: Y
  1.           Update_priv: Y
  1.           Delete_priv: Y
  1.           Create_priv: N
  1.             Drop_priv: N
  1.            Grant_priv: N
  1.       References_priv: N
  1.            Index_priv: N
  1.            Alter_priv: N
  1. Create_tmp_table_priv: N
  1.      Lock_tables_priv: N
  1.      Create_view_priv: N
  1.        Show_view_priv: N
  1.   Create_routine_priv: N
  1.    Alter_routine_priv: N
  1.          Execute_priv: N
  1.            Event_priv: N
  1.          Trigger_priv: N
  1. 1 row in set (0.04 sec)
  1.  
  1. ERROR:
  1. No query specified
  1.  
  1. mysql>
  1. mysql> show grants for test;
  1. +-----------------------------------------------------------------------------------------------------+
  1. | Grants for test@%                                                                                   |
  1. +-----------------------------------------------------------------------------------------------------+
  1. | GRANT USAGE ON *.* TO \'test\'@\'%\' IDENTIFIED BY PASSWORD \'*94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29\' |
  1. | GRANT SELECT, INSERT, UPDATE, DELETE ON `MyDB`.* TO \'test\'@\'%\'                                      |
  1. +-----------------------------------------------------------------------------------------------------+
  1. 2 rows in set (0.00 sec)
  1.  
  1. mysql>

 

 

 

3:那么我们来创建一个测试账号test,授予表层级的权限。如下所示:

 

 

  1. mysql> drop user test;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> flush privileges;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> grant all on MyDB.kkk to test@\'%\' identified by \'test\';
  1. Query OK, 0 rows affected (0.01 sec)
  1.  
  1. mysql>
  1.  
  1. mysql> show grants for test;
  1. +-----------------------------------------------------------------------------------------------------+
  1. | Grants for test@%                                                                                   |
  1. +-----------------------------------------------------------------------------------------------------+
  1. | GRANT USAGE ON *.* TO \'test\'@\'%\' IDENTIFIED BY PASSWORD \'*94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29\' |
  1. | GRANT ALL PRIVILEGES ON `MyDB`.`kkk` TO \'test\'@\'%\'                                                  |
  1. +-----------------------------------------------------------------------------------------------------+
  1. 2 rows in set (0.00 sec)
  1.  
  1. mysql> select * from mysql.tables_priv\G;
  1. *************************** 1. row ***************************
  1.        Host: %
  1.          Db: MyDB
  1.        User: test
  1. Table_name: kkk
  1.     Grantor: root@localhost
  1.   Timestamp: 0000-00-00 00:00:00
  1. Table_priv: Select,Insert,Update,Delete,Create,Drop,References,Index,Alter,Create View,Show view,Trigger
  1. Column_priv:
  1. 1 row in set (0.01 sec)
  1.  
  1. ERROR:
  1. No query specified
  1.  
  1. mysql>

 

 

clip_image002

 

 

 

4:那么我们来创建一个测试账号test,授予列层级的权限。如下所示:

 

  1. mysql> drop user test;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> flush privileges;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> grant select (id, col1) on MyDB.TEST1 to test@\'%\' identified by \'test\';
  1. Query OK, 0 rows affected (0.01 sec)
  1.  
  1. mysql> flush privileges;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql>
  1.  
  1.  
  1. mysql> select * from mysql.columns_priv;
  1. +------+------+------+------------+-------------+---------------------+-------------+
  1. | Host | Db   | User | Table_name | Column_name | Timestamp           | Column_priv |
  1. +------+------+------+------------+-------------+---------------------+-------------+
  1. | %    | MyDB | test | TEST1      | id          | 0000-00-00 00:00:00 | Select      |
  1. | %    | MyDB | test | TEST1      | col1        | 0000-00-00 00:00:00 | Select      |
  1. +------+------+------+------------+-------------+---------------------+-------------+
  1. 2 rows in set (0.00 sec)
  1.  
  1. mysql> show grants for test;
  1. +-----------------------------------------------------------------------------------------------------+
  1. | Grants for test@%                                                                                   |
  1. +-----------------------------------------------------------------------------------------------------+
  1. | GRANT USAGE ON *.* TO \'test\'@\'%\' IDENTIFIED BY PASSWORD \'*94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29\' |
  1. | GRANT SELECT (id, col1) ON `MyDB`.`TEST1` TO \'test\'@\'%\'                                             |
  1. +-----------------------------------------------------------------------------------------------------+
  1. 2 rows in set (0.00 sec)
  1.  
  1. mysql>

clip_image003

 

 

5:那么我们来创建一个测试账号test,授子程序层级的权限。如下所示:

 

 

  1. mysql> DROP PROCEDURE IF EXISTS PRC_TEST;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> DELIMITER //
  1. mysql> CREATE PROCEDURE PRC_TEST()
  1.     -> BEGIN
  1.     ->    SELECT * FROM kkk;
  1.     -> END //
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql> DELIMITER ;
  1.  
  1. mysql> grant execute on procedure MyDB.PRC_TEST to test@\'%\' identified by \'test\';
  1. Query OK, 0 rows affected (0.01 sec)
  1.  
  1. mysql> flush privileges;
  1. Query OK, 0 rows affected (0.00 sec)
  1.  
  1. mysql>
  1.  
  1.  
  1. mysql> show grants for test;
  1. +-----------------------------------------------------------------------------------------------------+
  1. | Grants for test@%                                                                                   |
  1. +-----------------------------------------------------------------------------------------------------+
  1. | GRANT USAGE ON *.* TO \'test\'@\'%\' IDENTIFIED BY PASSWORD \'*94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29\' |
  1. | GRANT EXECUTE ON PROCEDURE `MyDB`.`prc_test` TO \'test\'@\'%\'                                          |
  1. +-----------------------------------------------------------------------------------------------------+
  1. 2 rows in set (0.00 sec)
  1.  
  1. mysql> select * from mysql.procs_priv where User=\'test\';
  1. +------+------+------+--------------+--------------+----------------+-----------+---------------------+
  1. | Host | Db   | User | Routine_name | Routine_type | Grantor        | Proc_priv | Timestamp           |
  1. +------+------+------+--------------+--------------+----------------+-----------+---------------------+
  1. | %    | MyDB | test | PRC_TEST     | PROCEDURE    | root@localhost | Execute   | 0000-00-00 00:00:00 |
  1. +------+------+------+--------------+--------------+----------------+-----------+---------------------+
  1. 1 row in set (0.00 sec)
  1.  
  1. mysql>

 

 

clip_image004

 

 

所以,如果需要查看用户被授予的权限,就需要从这五个层级来查看被授予的权限。从上到下或从小到上,逐一检查各个层级被授予的权限。

版权声明:本文为wangchaoyuana原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://www.cnblogs.com/wangchaoyuana/p/7545419.html