Solved

Amazon EC2: Access denied for user abc / while other users can connect

Posted on 2010-08-31
2
793 Views
Last Modified: 2012-05-10
I've installed a php application on our server. I have created the user "abc", with a password, and I can login via commandline to mysql as this user. So the user seems to work correctly. We use Amazon EC2, and have a separate database server. When I run the installation wizard, I get the following error:

Access denied for user 'abc'@'ip-xxx.xxx.xxx.xxx.compute.internal' (using password: YES)

In the wizard, I can change the user to 'root', and then the connection works. I don't know what I'm doing wrong here. How can I get this working for this user?
0
Comment
Question by:R7AF
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 2

Accepted Solution

by:
chataros earned 500 total points
ID: 33595888
I think you may need to change the pass and try again with the new password:
MySQL Change User Password                               

 to change a password for user called tom using command line option.
   
First,  login to MySQL server, type following command at prompt to login as root
 1) mysql -u root -p
2) Use mysql database (type command at mysql> prompt, do not include string "mysql>"):
 mysql> use mysql;
3) Change password for user tom:
 mysql> update user set password=PASSWORD("NEW-PASSWORD-HERE") where User='tom';

then try again  to login
0
 
LVL 2

Assisted Solution

by:chataros
chataros earned 500 total points
ID: 33595909
Or if this still doesn't work, you may need to grant permissions to the tables:

GRANT SELECT,INSERT,UPDATE,DELETE,CREATE,DROP
    ->     ON Database.Table
    ->     TO 'user'@'localhost'
    ->     IDENTIFIED BY 'pass';


0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
Foreword This article was written many years ago, in the days when PHP supported the MySQL extension (http://php.net/manual/en/function.mysql-connect.php).  Today (http://php.net/manual/en/migration70.removed-exts-sapis.php) you would not use MySQL…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question