A. The ID that the user logged into the server through, and priveliges set up for that account.
B. MySQL login accounts, and priveliges set for each account
C. The normal login security is sufficient for MySQL, and it does not have any extra controls of its own.
D. A table of valid IP addresses, and priveliges set up for each IP address