This time I will show you how to deal with denial of access to the MySQL database, and what are the precautions for handling denial of access to the MySQL database. The following is a practical case, let's take a look.
Use wordpress to build a blog, and the database uses MySQL. For the convenience of debugging, create the account my_account and allow it to access the database from any host.
CREATE USER `my_account`@'%' IDENTIFIED BY 'my_password';Copy
Modify the corresponding configuration of wp-config.php, note that DB_HOST is set to 127.0.0.1.
define('DB_USER', 'my_account'); // 账号 define('DB_PASSWORD', 'my_password'); // 密码 define('DB_HOST', '127.0.0.1'); // 数据服务地址Copy
Deployed to the cloud server, the local browser accesses the blog, and prompts that the database access is denied (local connection to remote data is no problem), the following is the error log.
ERROR 1045 (28000): Access denied for user 'my_account'@'localhost' (using password: YES)`Copy
After simple troubleshooting, the problem was solved and is recorded here Below are the solutions and reasons for the error.
Solution
1. Solution 1: Delete the anonymous account whose Host field is localhost in the mysql.user table (the account name is empty).
2. Solution 2: Create the my_account@localhost account for local connection to the database.
The author adopted plan one.
First, confirm whether there is an anonymous account in the mysql.user table.
MariaDB [(none)]> SELECT User, Host from mysql.user WHERE Host = 'localhost' AND User = ''; +------+-----------+ | User | Host | +------+-----------+ | | localhost | +------+-----------+ 1 row in set (0.00 sec)Copy
Then, delete the corresponding anonymous account and try to log in again, successfully.
MariaDB [(none)]> DROP USER ''@'localhost'; Query OK, 0 rows affected (0.00 sec)Copy
Problem Analysis
Why does anonymous account cause database connection failure?
Requires a certain understanding of MySQL account creation and client connection verification.
Create MySQL account
The basic syntax is as follows:
CREATE USER account name@host IDENTIFIED BY password;Copy
Notes: (The following Use User to refer to the account name and Host to refer to the host)
Host indicates which host the account is allowed to access the database from. Mainly used for security restrictions, it can be host name, IP address, % (wildcard);
User is allowed to be repeated as long as the Host is different.
When Host is set to %, it means that the database is allowed to be connected from any host.
For example, there are two xiaoming accounts, one allows connecting to the database from the local machine, and the other allows connecting to the database from 14.215.177.39.
MariaDB [(none)]> SELECT User, Host FROM mysql.user WHERE User = 'xiaoming'; +---------+---------------+ | User | Host | +---------+---------------+ | xiaoming | 14.215.177.39 | | xiaoming | localhost | +---------+---------------+ 2 rows in set (0.00 sec)Copy
Anonymous account
is an account with empty User and can match any user name. The following command creates an anonymous account.
CREATE USER ''@'localhost' IDENTIFIED BY 'pwd3';Copy
Identity verification
When the database server receives the client connection, it will first For identity verification, compare the User, Host, and Password fields with the records in the mysql.user table to confirm whether the account is legitimate.
Here is a question: If there are multiple matching records in the mysql.user table, which record should prevail?
The answer is "priority". The general rules are as follows:
First, check the Host field. If multiple Hosts meet the criteria, the record with the highest matching score (IP address > wildcard %) is selected.
Secondly, check the User field. If multiple Users meet the criteria, the record with the highest matching degree is selected. Anonymous users can match any user and therefore have the lowest matching degree.
Priority matching example
For example, assume that the local database has the following two accounts (the Password field is actually not clear text).
+------------+-----------+-----------+ | User | Host | Password | +------------+-----------+-----------+ | my_account | % | 123 | | | localhost | 456 | +------------+-----------+-----------+Copy
Run the following command, and the account you finally logged in matches the 2nd record. (Readers can try it by themselves. If the login fails when entering the password 123, but successfully when entering the password 456)
mysql -u my_account -pCopy
Why? Review matching priorities.
First, check the Host field. localhost and % all meet the requirements. The matching degree of localhost is higher than %, so the second record is matched.
Next, check the User field. The second record is an anonymous account and can match any User value. Therefore, the second record meets the requirements.
Therefore, although the Host field of the account my_account is %, when you connect to the database locally (the host where the database is located), because of the existence of the above rules, MySQL will think that you are logging in with an anonymous account.
The password of my_account is different from that of the anonymous account, so the password verification fails and access is denied.
I believe you have mastered the method after reading the case in this article. For more exciting information, please pay attention to other related articles on the php Chinese website!
Recommended reading:
Detailed explanation of the steps to highlight the selected li in react
node.js deployment starts running in the background Detailed explanation of forever steps
The above is the detailed content of How to deal with MySQL database access denied. For more information, please follow other related articles on the PHP Chinese website!
Python vs. JavaScript: Community, Libraries, and ResourcesApr 15, 2025 am 12:16 AMPython and JavaScript have their own advantages and disadvantages in terms of community, libraries and resources. 1) The Python community is friendly and suitable for beginners, but the front-end development resources are not as rich as JavaScript. 2) Python is powerful in data science and machine learning libraries, while JavaScript is better in front-end development libraries and frameworks. 3) Both have rich learning resources, but Python is suitable for starting with official documents, while JavaScript is better with MDNWebDocs. The choice should be based on project needs and personal interests.
From C/C to JavaScript: How It All WorksApr 14, 2025 am 12:05 AMThe shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.
JavaScript Engines: Comparing ImplementationsApr 13, 2025 am 12:05 AMDifferent JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.
Beyond the Browser: JavaScript in the Real WorldApr 12, 2025 am 12:06 AMJavaScript's applications in the real world include server-side programming, mobile application development and Internet of Things control: 1. Server-side programming is realized through Node.js, suitable for high concurrent request processing. 2. Mobile application development is carried out through ReactNative and supports cross-platform deployment. 3. Used for IoT device control through Johnny-Five library, suitable for hardware interaction.
Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Apr 11, 2025 am 08:23 AMI built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing
How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)Apr 11, 2025 am 08:22 AMThis article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base
JavaScript: Exploring the Versatility of a Web LanguageApr 11, 2025 am 12:01 AMJavaScript is the core language of modern web development and is widely used for its diversity and flexibility. 1) Front-end development: build dynamic web pages and single-page applications through DOM operations and modern frameworks (such as React, Vue.js, Angular). 2) Server-side development: Node.js uses a non-blocking I/O model to handle high concurrency and real-time applications. 3) Mobile and desktop application development: cross-platform development is realized through ReactNative and Electron to improve development efficiency.
The Evolution of JavaScript: Current Trends and Future ProspectsApr 10, 2025 am 09:33 AMThe latest trends in JavaScript include the rise of TypeScript, the popularity of modern frameworks and libraries, and the application of WebAssembly. Future prospects cover more powerful type systems, the development of server-side JavaScript, the expansion of artificial intelligence and machine learning, and the potential of IoT and edge computing.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

SublimeText3 Linux new version
SublimeText3 Linux latest version






