How to Enable SSL and Remote Connections for MySQL on CentOS 7

MySQL is an open source relational database system that works on many Operating Systems including Windows, Linux, MacOS and FreeBSD. It is probably the most popular OpenSource RDBMS and a central component of the LAMP and LEMP Stacks. There are many applications that depend on MySQL like Wordpress, Joomla, TYPO3, phpBB and many more.

In this tutorial, I will show you step by step to configure MySQL securely for remote connections. When you need to access MySQL remotely, it's either required to use a VPN as MySQL does not encrypt the transferred data or you can configure MySQL to use SSL, as I will show you in this tutorial. In this configuration, only users with the correct SSL certificate files are allowed to connect to the MySQL server, and the traffic is encrypted. We will install the latest version of MySQL, and then configure SSL for the remote connection. For the base system, I will use a CentOS 7 server.

What we will do:

  1. Install MySQL.
  2. Configure the MySQL Root Password.
  3. Generate New Self-signed SSL Certificate Files.
  4. Enable SSL for MySQL.
  5. Enable Remote Connection.
  6. Testing.


  • CentOS 7 server
  • Root privileges

Step 1 - Install MySQL

In this tutorial, we will use MySQL 5.7, the latest version at this time. It's installed from the MySQL repository, so we have to add a new CentOS repository to the system first.

Add the new repository for MySQL with yum command below.

yum localinstall

You will be asked for installing a new package, type 'y' and press 'Enter' to confirm.

Now you can the install MySQL latest version 5.7 to the server like this:

yum -y install mysql-community-server

When the installation has been completed, start the MySQL service and enable it to run automatically at the boot time with the systemctl command.

systemctl start mysqld
systemctl enable mysqld

Make sure MySQL is running by checking the port used by MySQL (3306). Check it with the netstat command below.

netstat -plntu

Installing MySQL 5.7 on CentOS 7

MySQL has been installed on CentOS 7 from the MySQL repository.

Step 2 - Configure the MySQL Root Password

By default, MySQL 5.7 generates a default root password for you when starting the service the first time. The password is stored in the MySQL log file '/var/log/mysqld.log'.

To see the default MySQL root password, you can use the grep command below.

grep 'temporary' /var/log/mysqld.log

You will see a result similar to the one below, my default password is 'wxtX8Te&Uh1K'.

A temporary password is generated for [email protected]: wxtX8Te&Uh1K

Connect to the MySQL shell with the default password and the replace the password with your own password.

mysql -u root -p

Now replace the default password with your own password. In this tutorial, I will use '[email protected]' as the new MySQL root password. Run MySQL queries below.

ALTER USER 'root'@'localhost' IDENTIFIED BY '[email protected]';
flush privileges;

Configure MySQL root password on CentOS 7

Now you can connect again with the new password '[email protected]'.

mysql -u root -p
TYPE NEW PASSWORD '[email protected]'

Step 3 - Generate New Self-Signed Certificate Files

By default, MySQL 5.7 has its own SSL certificate files in the '/var/lib/mysql' directory. But in this tutorial, I will show you how to generate your own SSL Certificate files with OpenSSL, and then configure them with MySQL.

In this step, we will generate new self-signed certificate files. We need 3 certificates, CA Certificate, Server Certificate and Key, Client Certificate and Key. We will create them with OpenSSL.

Create a new directory for the SSL certificate files '/etc/certs/' and go to that directory.

mkdir -p /etc/certs
cd /etc/certs

Generate new CA certificate ca.pem file.

openssl genrsa 2048 > ca-key.pem
openssl req -new -x509 -nodes -days 3600 -key ca-key.pem -out ca.pem

Generate CA Certificate for MySQL

Next, we have to create the server-side certificates. Create new server certificate server-cert.pem and server-key.pem files. Generate new certificate files, remove the passphrase and sign them with the CA certificate.

openssl req -newkey rsa:2048 -days 3600 -nodes -keyout server-key.pem -out server-req.pem
openssl rsa -in server-key.pem -out server-key.pem
openssl x509 -req -in server-req.pem -days 3600 -CA ca.pem -CAkey ca-key.pem -set_serial 01 -out server-cert.pem

Generate Server Certificate for MySQL

Now generate certificate files for the client. The MySQL server will only accept remote connection from the client who has these certificate files. Generate new client certificate files, remove the passphrase and sign them using the CA certificate.

openssl req -newkey rsa:2048 -days 3600 -nodes -keyout client-key.pem -out client-req.pem
openssl rsa -in client-key.pem -out client-key.pem
openssl x509 -req -in client-req.pem -days 3600 -CA ca.pem -CAkey ca-key.pem -set_serial 01 -out client-cert.pem

Generate Client Certificate for MySQL


The CA certificate info must be different from the client and server info.

All certificates that we require for this setup have been generated. Now we can to verify certificate files with the command below.

openssl verify -CAfile ca.pem server-cert.pem client-cert.pem

Make sure there is no error, the results as below.

Verify Certificate FIles for MySQL

All Certificate files have been verified. Change the owner of the certs directory to the 'mysql' user and change permissions of all key files.

chown -R mysql:mysql /etc/certs/
chmod 600 client-key.pem server-key.pem ca-key.pem

Step 4 - Enable SSL for MySQL

In this step, we will enable SSL for MySQL. Before we start to configure and enable SSL on MySQL, we need to backup the default certificate files to the new backup directory.

Create new backup directory 'mysql-certs' for all certificates.

mkdir -p ~/mysql-certs/

Go to the '/var/lib/mysql' directory and move all default certificates to the backup directory.

cd /var/lib/mysql/
mv ca.pem ca-key.pem ~/mysql-certs/
mv server-key.pem server-cert.pem ~/mysql-certs/
mv client-key.pem client-cert.pem ~/mysql-certs/
mv private_key.pem public_key.pem ~/mysql-certs/

Now restart the MySQL service.

systemctl restart mysqld

Backup Default MySQL Certificates to New Backup Directory

Next, check SSL from the MySQL shell. Login to mysql with the new password:

mysql -u root -p
TYPE NEW PASSWORD '[email protected]'

Run the query below so we can see the SSL status for MySQL.


You will see SSL status is 'DISABLED', and the root user has been connected without SSL.

SSL on MySQL Disabled and Root User Connected without SSL

Next, we will enable the SSL connection for MySQL. We have to edit the MySQL configuration file 'my.cnf' file with vim.

vim /etc/my.cnf

In the '[mysqld]' section, paste the configuration below.

# Type your own certificates directory

Save the file and exit vim, the restart MySQL service.

systemctl restart mysqld

Now login to the MySQL again and check the SSL.

mysql -u root -p
TYPE NEW PASSWORD '[email protected]'

Run query below to make sure SSL section value is 'YES'.


SSL for MySQL Enabled, but Root user still not connected without SSL

You will see that SSL for MySQL is enabled, but the root user still not connected using the SSL connection.

To force all local user connection with SSL, edit the mysql configuration file 'my.cnf' again.

vim /etc/my.cnf

Paste configuration below to the end of the line.


Save and exit, then restart MySQL.

systemctl restart mysqld

Connect to the MySQL again and check the connection and SSL enabled.

mysql -u root -p
TYPE NEW PASSWORD '[email protected]'


SSL is Enabled on MySQL and Root user connected with SSL

SSL has been enabled and the local connection uses SSL as well.

Step 5 - Enable Remote Connections

In the steps above, we've already enabled SSL for the MySQL server, and local connections are forced to use SSL. In this step, we will enable remote connections for MySQL, but we allow only clients have certificate files signed by our CA to connect to the MySQL server.

Edit MySQL configuration file with vim.

vim /etc/my.cnf

Paste this configuration below at the end of the '[mysqld]' section.

bind-address = *
require_secure_transport = ON

Save the file and exit the editor, the restart MySQL.

systemctl restart mysqld

Next, create a new user for the remote connection. I will create a new user named 'hakase' with password '[email protected]' and grant all privileges to the 'hakase' user. 'hakase' user will only be able to connect with the Certificate key.

mysql -u root -p
TYPE NEW PASSWORD '[email protected]'

create user 'hakase'@'%' identified by '[email protected]' REQUIRE X509;
grant all privileges on *.* to 'hakase'@'%' identified by '[email protected]' REQUIRE X509;
flush privileges;

Create New user for Remote Connection MySQL

New user for remote connection has been created.


You might see '1 warning' in the mysql query result. It's just warning about using ALTER USER query instead of a GRANT because 'GRANT' query will be deprecated in the next release.

Step 6 - Testing

In the final section of this tutorial, we will test the if the new user named 'hakase' is able to connect to the MySQL server remotely with certificate files. Three certificates for the client must be downloaded.

  1. CA certificate - ca.pem
  2. Client certificate - client-cert.pem
  3. Client key - client-key.pem

I've logged into another Linux system and installed the mysql-client packages there. Then I've downloaded all client certificate files with SCP. Now I will connect to the MySQL server with the certificate files.

mysql -h -u hakase \
--ssl-ca=ca.pem \
--ssl-cert=client-cert.pem \
--ssl-key=client-key.pem -p = IP address of MySQL Server.

Connect remotely to the MySQL Server CentOS 7

You can see the connection status with this query below.


Remote Connection with SSL on MySQL

User hakase with IP address Connected to the MySQL server with IP address, the connection via TCP/IP on port 3306 and using SSL.

When you try to connect without Certificate files, you will see the error as below.

Access denied remote connection without Client Certificate

Next, I will test with the MySQLWorkbench GUI from my host.

Below is my configuration - Setting Parameter.

Configure Connection MySQLWorkbench

SSL Configuration - Setting SSL.

SSL Configuration for MySQLWOrkbench

And below the results of the connection with SSL Client Certificate files.

MySQLWorkbench Connected with SSL

A new user successfully connected remotely to the MySQL database server with an SSL connection. When a user tries to connect without the Certificate files, the result will be 'denied'. Installation and Configuration of MySQL with SSL connection has been successfully.


Share this page:

11 Comment(s)

Add comment

Please register in our forum first to comment.


By: William

Excellent article, well explained and easy to follow.As a contribution, just mention that in step 2 and step 5, it's not necessary FLUSH PRIVILEGES after changing (ALTER USER) the user's password or creating the new user (CREATE USER and GRANT). See section of manual 6.2.6 When Privilege Changes Take Effect and Stop using FLUSH PRIVILEGES.Thanks and best regards.

By: Rodrigo

Hi, this is one of the best procedures I have ever read. Unfortunately, I had an issue on the pasting part (server certificates), the service started on safe mode or failed to start. Is it because I'm using version 5.6?

By: coddybrj

openssl req -new -x509 -nodes -days 3600 -key ca-key.pem -out ca.pemneed to know what does this -days 3600 fucntions. is it related to the expiration of the certs? please advised.

By: till

Yes, that's the expiration period.

By: reddy


Nice article. very well written. I have tried implementing this, but when it comes to step 5 "require_secure_transport = ON" MySQL won't turn back on and it throws an error 2019-01-04 11:33:53 28485 [ERROR] /usr/sbin/mysqld: unknown variable 'require_secure_transport=ON'. MySQL version 5.6.42. Is it because i am using 5.6 ?

By: Kris


The CA certificate info must be different from the client and server info.^^^This information would be more useful BEFORE the steps to create all the certificates!!!!

By: watzefok

Thanks for sharing !

By: Ivan

Thanks for the article !

I followed it on an Ubuntu 20.04 box.I had some troubles getting "have_openssl" and "have_ssl" set to "YES"...It turned out that it was Apparmor which was preventing mysql to access the certificats and keys in the /etc/certs directory. I had to move this directory under /etc/mysql.Then it worked !

By: Adam Mulla


Thanks for you article. this is working in MySQL 8.0.19.  

We we days 3600 which 10years. what will be steps suppose i need to renew or i need to set as permanent basis?



By: kikilia


j'ai bien suivis ce totoriel ca a marché avec  succé mais le probleme que ca ne marche pas avce un sript php  


ini_set ('error_reporting', E_ALL);

ini_set ('display_errors', '5');

error_reporting (E_ALL|E_STRICT);

$db = mysqli_init();

mysqli_options ($db, MYSQLI_OPT_SSL_VERIFY_SERVER_CERT, true);

$db->ssl_set('config/client-key.pem', 'config/client-cert.pem' , 'config/ca.pem', NULL, NULL);

$link = mysqli_real_connect ($db, 'ip', 'user', 'motdepasse', 'db', 52000, NULL,  MYSQLI_CLIENT_SSL);

if (!$link)


    die ('Connect error (' . mysqli_connect_errno() . '): ' . mysqli_connect_error() . "\n");

} else {

    $res = $db->query('SHOW TABLES;');

    print_r ($res);





By: Omid

Hi Muhammad,

What is the name of your monitoring MySQL?