MySQL Enterprise Monitor 3.3.9 Manual

Chapter 26 Access Control - Best Practices

This chapter describes some best practices for setting up your access control permissions. As each organization has a different way of implementing their MySQL installations and monitoring, the scenarios described are general guidelines.

The following scenarios are described:

The roles involved in each scenario are as follows: