Cloud Service >> Knowledgebase >> Database >> How to Modify Database User Privileges in Plesk Panel
submit query

Cut Hosting Costs! Submit Query Today!

How to Modify Database User Privileges in Plesk Panel

Plesk is a web hosting control panel that simplifies several website management tasks. Web administrators are responsible for granting database user privileges to achieve proper security and functionality.

This guide will walk you through the process of modifying database user privileges in the Plesk Panel.

Understanding Database User Privileges

Before altering a database, it is necessary to know the privileges of the users. The latter specifies the operations that a user can perform on a database. Common privileges include: 

 

- SELECT

- INSERT

- UPDATE

- DELETE

- CREATE

- DROP

Managing these privileges effectively is essential to maintaining database security and integrity.

Steps to Modify Database User Privileges in Plesk Panel

Step 1: Access the Plesk Panel

- Log in to your account

- Use your administrative credentials to access the main dashboard.

- Manage various aspects of your hosting environment.

Step 2: Move to Databases

- Once logged in, navigate to the "Databases".

- It is typically found under the "Websites & Domains" tab.

- Here, you will see a list of all databases associated with your account.

Step 3: Select the Database

- Identify and choose the database for which you want to modify user privileges.

- Clicking on the database name will open the management page.

Step 4: Manage Database Users

- On the database management page, you will see an option labeled "User Management" or simply "Users."

- Click on this option to view a list of accounts associated with the selected database.

Step 5: Edit User Privileges

- Find the user whose privileges you wish to modify.

- Click on the user's name or the corresponding "Privileges."

- This page will display a list of all available privileges.

Step 6: Modify Privileges

Check or uncheck the boxes next to the privileges you want to modify. It includes

- SELECT: Enable the user to read data from the database.

- INSERT: Allows the user to insert new data into the database.

- UPDATE: Allows the user to modify existing data in the database.

- DELETE: Allows the user to remove data from the database.

- CREATE: Allows the user to create new tables or databases.

- DROP: Enable the user to delete tables or databases.

- ALTER: Enable the user to modify the structure of tables.

- INDEX: Enable the user to create or remove indexes.

Make the necessary changes by selecting or deselecting the privileges as required.

Step 7: Save Changes

- After adjusting the privileges, ensure to save your changes.

- A "Save" or "Apply" button is typically at the bottom of the privileges page.

- Click this button to apply the modifications.

Verifying the Changes

To ensure that the privileges have been updated correctly, you can verify the changes in a couple of ways:

Check-in Plesk Panel: Go back to the user management section and review the privileges to confirm they reflect your changes.

Test User Access: Log in to the database using the modified user credentials and attempt to perform actions corresponding to the granted or revoked privileges. This step ensures that the changes have been correctly implemented.

Best Practices for Managing Database User Privileges

Principle of Least Privilege

This principle should always be followed. This means that users should be assigned only the required permissions to complete their tasks.

Regular Reviews

Periodically review and modify the database user rights to reflect users' current job functions. Audit plays a vital role in identifying such unnecessary privileges that have been granted.

Use of Roles

If supported by your database management system, consider using roles to manage privileges. It can be useful in administering privileges by giving a set of privileges to a role and then assigning users to that role.

Strong Password

Make sure all database users use unique passwords. It ensures privacy because it denies access to unauthorized persons.

To Sum it Up!

Granting and revoking database user privileges in the Plesk Panel is relatively easy and makes database management faster and more secure. Following the steps listed above and implementing good practices, you can successfully control access to your database and prevent unauthorized actions. Periodic auditing and the principle of least privilege are some requirements for a secure database environment.

Cut Hosting Costs! Submit Query Today!

Grow With Us

Let’s talk about the future, and make it happen!