MySQL Enterprise Monitor 8.0.38 Manual

Chapter 24 Access Control - Best Practices

This chapter describes some best practices for setting up your access control permissions. As each organization has a different way of implementing their MySQL installations and monitoring, the scenarios described are general guidelines.

The following scenarios are described:

The roles involved in each scenario are as follows: