Aurora MySQL Default Authentication Plugin,mysql_native_password,

MySQL default authentication plugin-

mysql_native_password, caching_sha2_password

AWS RDS for MySQL version 8.0.34 and higher 8.0 versions use the mysql_native_passwordplugin. You can't change thedefault_authentication_plugin setting.

RDS for MySQL version 8.4 and higher versions use the caching_sha2_password plugin as the default authentication plugin.You can change the default authentication plugin for MySQL 8.4. The mysql_native_passwordplugin still works with MySQL 8.4, but support of this plugin ends with MySQL 8.4

To change the default authentication plugin, create a custom parameter group and modify the value of theauthentication_policy parameter

MySQL’s mysql_native_password plugin is deprecated starting from MySQL 8.0.34, disabled by default in MySQL 8.4, and removed entirely in MySQL 9.0. Amazon RDS for MySQL has switched to caching_sha2_password as the default authentication plugin for improved security and performance

Example

  1. some clients supports both caching_sha2_password and mysql_native_password authentication plugins. However, compatibility depends on the MySQL version and the configuration of your database.
  2. caching_sha2_password: This is the default authentication plugin since MySQL 8.0. It provides better performance through server-side caching and additional features like RSA-based password exchange.

mysql_native_password: This plugin is deprecated in MySQL 8.0 and removed in MySQL 9.2, so newer MySQL servers no longer support it.

Ensure client is updated to support caching_sha2_password, as older clients may encounter compatibility issue.


AWS RDS Proxy

Starting with MySQL 8.4, community MySQL uses caching_sha2_password plugin as the default.

To align with this, starting , caching_sha2_password will also be the default authentication plugin for new connection creates with RDS Proxy, if a value is not specified.

for some reason if we want to still use mysql_native_password in Proxy then we need to explicitly set the Auth Type in proxy

https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_proxy#client_password_auth_type-1

Amazon Aurora currently supports MySQL 8.0 through Aurora MySQL version 3, with the latest release being version 3.08.1, compatible with MySQL 8.0.39. MySQL 9 is not yet supported in Aurora, as its compatibility and release are tied to AWS’s adoption timeline and MySQL community updates.

https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/MySQL.KnownIssuesAndLimitations.html#MySQL.Concepts.KnownIssuesAndLimitations.authentication-plugin

Comments

Popular posts from this blog

What’s Inside EKS? A Beginner’s Guide to Its Core Components

My First Cruise to the Bahamas: What to Pack & What to Expect – A 4-Night Adventure!