CREATE USER
On this page
Create a new user account.
Syntax
CREATE USER [IF NOT EXISTS] user[@host][IDENTIFIED BY 'password'][WITH {DEFAULT RESOURCE POOL = poolname} |{FAILED_LOGIN_ATTEMPTS = integer PASSWORD_LOCK_TIME = integer} |{DEFAULT RESOURCE POOL = poolname FAILED_LOGIN_ATTEMPTS = integer PASSWORD_LOCK_TIME = integer}][REQUIRE {SSL | X509 | SUBJECT | NONE}][ATTRIBUTE <valid json>][COMMENT <comment string>]
Note
Instead of authentication by password, other authentication types: Kerberos, PAM, and SAML can also be used with the clause.
IDENTIFIED WITH {authentication_
CREATE USER user IDENTIFIED WITH authentication_
CREATE USER user IDENTIFIED WITH authentication_
See section “Using PAM Pluggable Authentication” here.
Arguments
user: The name of the user.
-
Non-JWT users: Maximum length of 32 characters.
-
JWT users: Maximum length of 320 characters.
host: The host that the user can connect from.localhost means the user account can be used only when connecting from the local host.% wildcard will be used, which allows the user to connect from any host.
password: An optional database connection password.
poolname: The default resource pool for the user.
FAILED_PASSWORD_, specifies the failed login attempt lockout behavior.FAILED_ is the number of failed attempts allowed after which the account is locked out.PASSWORD_ must also be specified.
PASSWORD_FAILED_, specifies the failed login attempt lockout behavior.PASSWORD_ is the number of seconds a locked out account must wait before reattempting to log in.
REQUIRE: has the following options:
-
SSLoption ensures that the user connects via SSL. -
NONEspecifies that SSL will not be required for the connection. -
X509enables mutual authentication of both client (mySQL CLI) and server (memsqld). -
SUBJECTchecks the subject in the client certificate provided during mTLS connection.The subject specified here should exactly match the subject in the client certificate and should be specified in OpenSSL oneline format (“/” between every field. Specifying REQUIRE SUBJECTautomatically means that the user is configured withREQUIRE X509and has to provide a client certificate when connecting.For example:
CREATE USER 'bob' REQUIRE SUBJECT '/CN=bob/O=example/C=US';Note
You must set both FAILED_ and PASSWORD_ to enable the lockout feature.
To modify the FAILED_ and PASSWORD_ settings for a user, or to unlock a locked user, use ALTER USER.
If an account is locked either manually using the ALTER USER … ACCOUNT LOCK command or automatically as a result of exceeding the values specified for FAILED_ and PASSWORD_ arguments then restarting the cluster removes the lock and returns the account’s status to ONLINE.ACCOUNT_ column in the information_
For more information about failed login attempt lockout behavior, see Securing SingleStore.
ATTRIBUTE and COMMENT: Optional arguments used to provide additional information about a user.ATTRIBUTE must come first.
Remarks
-
The
CREATE USERcommand must be run by a user with administrative privileges on the database.Also, the new user does not have any privileges granted by default. Use GRANT to specify privileges for the new user. -
Other
CREATE USERcommand options aren’t applied in case the user exists andIF NOT EXISTSis specified, one has to use theGRANTcommand to assign privileges or theALTER USERcommand to change user properties. -
The
WITHkeyword must be used with the following options and should be specified only once:-
[
DEFAULT RESOURCE POOL = <poolname>] -
[
FAILED_]LOGIN_ ATTEMPTS = integer PASSWORD_ LOCK_ TIME = <integer>
WITH DEFAULT RESOURCE POOL = pool1 FAILED_LOGIN_ATTEMPTS = 10 PASSWORD_LOCK_TIME = 20or
WITH FAILED_LOGIN_ATTEMPTS = 10 PASSWORD_LOCK_TIME = 20or
WITH DEFAULT RESOURCE POOL = pool1 -
-
This command causes implicit commits.
Refer to COMMIT for more information. -
The
CREATE USERcommand only applies to the current node unless thesync_engine variable is set topermissions ON. -
The
CREATE USERcommand holds a global lock on the cluster until the processing of the command is completed.See Cluster Level Locks for more info. -
For users with
REQUIRE X509, login is done as follows:memsql -u user \ --ssl-ca=/etc/mysql/certs/ca.pem \ --tls-version=TLSv1.2 \ --ssl-cert=/etc/mysql/certs/client-cert.pem \ --ssl-key=/etc/mysql/certs/client-key.pemAll three namely,
--ssl-cert,--ssl-keyand--ssl-camust be specified withREQUIRE X509else the login results in an error.The client’s certificate provided as above will be verified by the server during SSL authentication -
Refer to the Permission Matrix for the required permissions.
Examples
The following example demonstrates how to add a new user and grant it the SELECT privilege on all tables in the mydb database:
CREATE USER joe;GRANT SELECT ON mydb.* TO 'joe'@'%';
The following example demonstrates how to create a resource pool and assign it to a new user along with controlling the login attempts"
CREATE RESOURCE POOL test_pool WITH QUERY_TIMEOUT = 20;CREATE USER user1 IDENTIFIED BY 'User123' WITH DEFAULT RESOURCE POOL = test_pool FAILED_LOGIN_ATTEMPTS = 3 PASSWORD_LOCK_TIME = 14400;
The following example demonstrates the use of the default_ variable and the REQUIRE option:
CREATE USER `alice`@`%`; -- uses default_require_ssl var (off by default)CREATE USER `alice`@`%` REQUIRE NONE; -- does not require SSLCREATE USER `alice`@`%` REQUIRE SSL; -- requires SSL
The following examples demonstrate the use of ATTRIBUTE and COMMENT:
CREATE USER 'user1'@'localhost' ATTRIBUTE '{"phone": "1234567890"}';CREATE USER 'user1'@'localhost' COMMENT 'Some information about user1';
Retrieving ATTRIBUTE and COMMENT values from the INFORMATION_
CREATE USER singlestore@localhost ATTRIBUTE '{"a": 1, "b": 2}' COMMENT 'some information about user singlestore';
Query OK, 0 rows affected (0.026 sec)SELECT USER, ATTRIBUTE, COMMENT from INFORMATION_SCHEMA.USERS WHERE user='singlestore';
+-------------+---------------+-----------------------------------------+
| USER | ATTRIBUTE | COMMENT |
+-------------+---------------+-----------------------------------------+
| singlestore | {"a":1,"b":2} | some information about user singlestore |
+-------------+---------------+-----------------------------------------+
1 row in set (0.127 sec)SELECT USER, ATTRIBUTE, COMMENT, ATTRIBUTE::a + ATTRIBUTE::b AS c FROM INFORMATION_SCHEMA.USERS WHERE user='singlestore';
+-------------+---------------+-----------------------------------------+------+
| USER | ATTRIBUTE | COMMENT | c |
+-------------+---------------+-----------------------------------------+------+
| singlestore | {"a":1,"b":2} | some information about user singlestore | 3 |
+-------------+---------------+-----------------------------------------+------+
1 row in set (0.114 sec)The following examples demonstrate assigning REQUIRE X509 to a user:
CREATE USER 'user'@'localhost' REQUIRE X509;-- (or)CREATE USER 'user'@'localhost';ALTER USER 'user'@localhost' REQUIRE X509;-- (or)CREATE USER 'user'@'localhost';GRANT USAGE on *.* to 'user'@'localhost' REQUIRE X509;-- (or)CREATE USER 'user'@'localhost';CREATE ROLE 'role';GRANT USAGE on *.* to ROLE 'role' REQUIRE X509;CREATE GROUP 'group';GRANT ROLE 'role' to 'group';GRANT GROUP 'group' to 'user'@'localhost';
Last modified: October 23, 2025