Create users in Azure Database for MySQL
APPLIES TO: Azure Database for MySQL - Single Server Azure Database for MySQL - Flexible Server
Azure Database for MySQL - Single Server is on the retirement path. We strongly recommend for you to upgrade to Azure Database for MySQL - Flexible Server. For more information about migrating to Azure Database for MySQL - Flexible Server, see What's happening to Azure Database for MySQL Single Server?
This article describes how to create users for Azure Database for MySQL.
This article contains references to the term slave, a term that Microsoft no longer uses. When the term is removed from the software, we'll remove it from this article.
When you first created your Azure Database for MySQL server, you provided a server admin user name and password. For more information, see this Quickstart. You can determine your server admin user name in the Azure portal.
The server admin user has these privileges:
SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, RELOAD, PROCESS, REFERENCES, INDEX, ALTER, SHOW DATABASES, CREATE TEMPORARY TABLES, LOCK TABLES, EXECUTE, REPLICATION SLAVE, REPLICATION CLIENT, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE, CREATE USER, EVENT, TRIGGER
After you create an Azure Database for MySQL server, you can use the first server admin account to create more users and grant admin access to them. You can also use the server admin account to create less privileged users that have access to individual database schemas.
The SUPER privilege and DBA role aren't supported. Review the privileges in the limitations article to understand what's not supported in the service.
Password plugins like
caching_sha2_password aren't supported by the service.
Create a database
Get the connection information and admin user name. To connect to your database server, you need the full server name and admin sign-in credentials. You can easily find the server name and sign-in information on the server Overview page or on the Properties page in the Azure portal.
Use the admin account and password to connect to your database server. Use your preferred client tool, such as MySQL Workbench, mysql.exe, or HeidiSQL.
Edit and run the following SQL code. Replace the placeholder value
db_userwith your intended new user name. Replace the placeholder value
testdbwith your database name.
This SQL code creates a new database named testdb. It then creates a new user in the MySQL service and grants all privileges for the new database schema (testdb.*) to that user.
CREATE DATABASE testdb;
Create a non-admin user
Now that the database is created , you can create with a non-admin user with the
CREATE USER MySQL statement.
CREATE USER 'db_user'@'%' IDENTIFIED BY 'StrongPassword!'; GRANT ALL PRIVILEGES ON testdb . * TO 'db_user'@'%'; FLUSH PRIVILEGES;
Verify the user permissions
SHOW GRANTS MySQL statement to view the privileges allowed for user db_user on testdb database.
USE testdb; SHOW GRANTS FOR 'db_user'@'%';
Connect to the database with new user
Sign in to the server, specifying the designated database and using the new user name and password. This example shows the mysql command line. When you use this command, you'll be prompted for the user's password. Use your own server name, database name, and user name. See how to connect for Single server and Flexible server below.
Limit privileges for user
To restrict the type of operations a user can run on the database, you need to explicitly add the operations in the GRANT statement. See an example below:
CREATE USER 'new_master_user'@'%' IDENTIFIED BY 'StrongPassword!'; GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, RELOAD, PROCESS, REFERENCES, INDEX, ALTER, SHOW DATABASES, CREATE TEMPORARY TABLES, LOCK TABLES, EXECUTE, REPLICATION SLAVE, REPLICATION CLIENT, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE, CREATE USER, EVENT, TRIGGER ON *.* TO 'new_master_user'@'%' WITH GRANT OPTION; FLUSH PRIVILEGES;
All Azure Database for MySQL servers are created with a user called "azure_superuser". This is a system account created by Microsoft to manage the server to conduct monitoring, backups, and other regular maintenance. On-call engineers may also use this account to access the server during an incident with certificate authentication and must request access using just-in-time (JIT) processes.