This topic describes how to grant privileges to users by using the GRANT statement.
Prerequisites
You must have the GRANT OPTION privilege and the privileges to be granted. For example, if the test1 user wants to grant the SELECT privilege on the t1 table to the test2 user, the test1 user must have the GRANT OPTION privilege and the SELECT privilege on the t1 table.
For information about how to view your privileges, see View user privileges.
Considerations
Before you grant a privilege, note that:
When you grant a privilege to a user, the user is automatically created if the user does not exist. However, if
sql_mode='no_auto_create_user'is specified andIDENTIFIED BYis not used in the statement to specify a password, the user cannot be created directly.When granting multiple privileges to a user at the same time, separate the privileges with commas (,).
When granting a privilege to multiple users at the same time, separate the usernames with commas (,).
If a user has been granted a privilege, the privilege takes effect only after the user is reconnected to OceanBase Database.
OceanBase Database does not support the
CHANGE EFFECTIVE TENANTstatement for privilege control. Therefore, you can grant a privilege to all users in thesystenant.
Syntax for granting privileges
The syntax for granting privileges is as follows:
GRANT priv_type
ON priv_level
TO user_specification [, user_specification]...
[WITH GRANT OPTION];
priv_level:
*
| *.*
| database_name.*
| database_name.table_name
| table_name
| database_name.routine_name
user_specification:
user_name [IDENTIFIED BY [PASSWORD] 'password']
where:
priv_type: the type of the privilege to be granted. When you grant multiple privileges to a user at a time, separate the privileges with commas (,).To grant a column-level privilege, specify the column names after the privilege type in the
priv(col_list)format, and separate the column names with commas (,). For example, to grant theSELECTprivilege on thec1column, specifySELECT(c1).When you grant a privilege on the columns of a table, observe the following notes:
To allow a user to execute the
UPDATEstatement on a column, you need to grant the user theUPDATEprivilege on the column and theSELECTprivilege on other columns to be accessed.Here is an example:
obclient> UPDATE tb1 SET c1=c3, c2=1+3 WHERE c4=1;The preceding statement specifies to update the
c1andc2columns, which requires access to thec3andc4columns. Therefore, you need to grant the user theUPDATEprivilege on thec1andc2columns, and theSELECTprivilege on thec3andc4columns.To allow a user to execute the
INSERTorREPLACEstatement on a column, you need to grant the user theINSERTprivilege on the column and theSELECTprivilege on other columns to be accessed.To allow a user to execute other statements on a column, grant the user the
SELECTprivilege on the columns to be accessed.
For more information about the privilege types supported in MySQL mode, see Privilege types in MySQL mode.
priv_level: the level of the privilege to be granted. In MySQL mode, OceanBase Database provides privileges of the following levels:Global: Privileges at this level apply to all databases. You can use the
GRANT ... ON *.*statement to grant global privileges.Database level: Privileges at this level apply to all objects in a specified database. You can use
GRANT ... ON db_name.*to grant database privileges.Table level: Privileges at this level apply to all columns in a specified table. You can use
GRANT ... ON database_name.table_nameto grant table-level privileges.When you grant column-level privileges, you can also use
GRANT ... ON database_name.table_nameto specify the table name.
user_specification: the user to which one or more privileges are granted. If the user does not exist, the user is automatically created.When you grant a privilege to multiple users at a time, separate the usernames with commas (,).
user_name IDENTIFIED BY 'password'anduser_name IDENTIFIED BY PASSWORD 'password': The password in theuser_name IDENTIFIED BY 'password'clause is in plaintext. The password in theuser_name IDENTIFIED BY PASSWORD 'password'clause is in ciphertext.WITH GRANT OPTION: specifies whether the privileges can be delegated or revoked.
Examples
Grant global privileges
Global privileges apply to all databases. You can use the
GRANT ... ON *.*statement to grant global privileges.To grant all privileges on all objects in all databases to the
testuser, execute the following statement:obclient> GRANT ALL ON *.* TO test;To grant the
INSERTandSELECTprivileges on all tables in all databases to thetestuser, execute the following statement:obclient> GRANT SELECT, INSERT ON *.* TO test;
Grant database-level privileges
Database-level privileges are management privileges on all objects in a specified database. You can use
GRANT ... ON db_name.*to grant database-level privileges.To grant management privileges on all objects in the
db1database to thetestuser, execute the following statement:obclient> GRANT ALL ON db1.* TO test;To grant the
INSERTandSELECTprivileges on all tables in thedb1database to thetestuser, execute the following statement:obclient> GRANT SELECT, INSERT ON db1.* TO test;
Grant table-level privileges
Table-level privileges are management privileges on a specified table in a specified database. You can use
GRANT ... ON db_name.tb1_nameto grant table-level privileges.To grant the
INSERTandSELECTprivileges on thetb1_nametable in thedb1database to thetestuser, execute the following statement:obclient> GRANT SELECT, INSERT ON db1.tb1_name TO test;To grant management privileges on the
tb1_nametable in thedb1database to thetestuser, execute the following statement:obclient> GRANT ALL ON db1.tb1_name TO test;
Grant column-level privileges
Column-level privileges are management privileges on a specified column of a specified table.
The following sample statement grants the
testuser theSELECTprivilege on thec1column and theINSERTprivilege on thec1andc2columns of thetb1_nametable in thedb1database:obclient> GRANT SELECT(c1), INSERT (c1, c2) ON db1.tb1_name TO test;
For more information about the GRANT statement, see GRANT.