Installing the Software Vulnerability Manager On-Premises Edition in Dual Mode

If the Software Vulnerability Manager On-Premises Edition is installed in dual mode - one to host Apache, PHP and Software Vulnerability Manager and the second server for MySQL - you should create a database user with the appropriate privileges to allow remote access to the database from the Software Vulnerability Manager Server.

The following query needs to be executed on the MySQL server:

Example user name "csi"
Example password "Sekret1"

GRANT EXECUTE, PROCESS, SELECT, SHOW DATABASES, SHOW VIEW, ALTER, CREATE, CREATE TEMPORARY TABLES, CREATE VIEW, DELETE, DROP, INDEX, INSERT, UPDATE, CREATE USER, FILE, LOCK TABLES, RELOAD, SUPER ON *.* TO 'csi'@'%' IDENTIFIED BY 'Sekret1' WITH GRANT OPTION;

GRANT USAGE ON *.* TO 'csi'@'%';

FLUSH PRIVILEGES;

When ‘csi’@’%’ is used, it creates a user named csi that can connect remotely from any host ‘%’. To lock-down the host, it can connect from/to the Software Vulnerability Manager App Server when you create the access grants (instead of %) for the host name and IP address as follows:

Example host name "csi7server.network.local" 

… ON *.* TO 'csi'@'csi7server.network.local' IDENTIFIED BY 'Sekret1' WITH GRANT OPTION;

Example IP address "10.0.0.127" 

… ON *.* TO 'csi'@'10.0.0.127' IDENTIFIED BY 'Sekret1' WITH GRANT OPTION;

Executing the grant twice, once for host name, once for IP, will allow the App server to connect if it is recognized by either host name or IP address.