Skip to content

Commit efd6c12

Browse files
docs: permissions for non-admin users accessing MultiAZ clusters (#1602)
Co-authored-by: Sophia Chu <[email protected]>
1 parent 8df2a3f commit efd6c12

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

docs/using-the-jdbc-driver/SupportForRDSMultiAzDBCluster.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,12 @@ The process of using the AWS JDBC Driver with RDS Multi-AZ DB Cluster is the sam
88

99
### MySQL
1010

11+
There are permissions that must be granted to all non-administrative users who need database access. Without proper access, these users cannot utilize many of the driver's advanced features, including failover support. To grant the necessary permissions to non-administrative users, execute the following statement:
12+
13+
```sql
14+
GRANT SELECT ON mysql.rds_topology TO 'non-admin-username'@'%'
15+
```
16+
1117
Preparing a connection with MySQL in a Multi-AZ Cluster remains the same as before:
1218

1319
```java
@@ -24,6 +30,12 @@ Per AWS documentation and [this blog post](https://aws.amazon.com/blogs/database
2430
CREATE EXTENSION rds_tools;
2531
```
2632

33+
The extension must be granted to all non-administrative users who need database access. Without access to `rds_tools`, non-admin users cannot utilize many of the driver's advanced features, including failover support. To grant the necessary permissions to non-administrative users, execute the following statement:
34+
35+
```sql
36+
GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA rds_tools TO non-admin-username;
37+
```
38+
2739
Then, prepare the connection with:
2840

2941
```java

0 commit comments

Comments
 (0)