Skip to content

Commit 3519a08

Browse files
Add token privilege notes (#1015)
1 parent e51ace3 commit 3519a08

File tree

3 files changed

+26
-1
lines changed

3 files changed

+26
-1
lines changed

modules/ROOT/pages/administration/access-control/database-administration.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -837,6 +837,10 @@ GRANT NAME [MANAGEMENT]
837837

838838
|===
839839

840+
[NOTE]
841+
====
842+
The `SHOW PRIVILEGES` commands return the `NAME MANAGEMENT` privilege as the action `token`, when not using `AS COMMANDS`.
843+
====
840844

841845
For example, to grant the role `regularUsers` the ability to create new properties on nodes or relationships on the database `neo4j`, use:
842846

modules/ROOT/pages/administration/access-control/manage-privileges.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -599,6 +599,11 @@ Lists all privileges for all roles:
599599
6+a|Rows: 39
600600
|===
601601

602+
[NOTE]
603+
====
604+
The `token` action corresponds to the `NAME MANAGEMENT` privilege.
605+
====
606+
602607
It is also possible to filter and sort the results by using `YIELD`, `ORDER BY` and `WHERE`:
603608

604609
[source, cypher, role=noplay]
@@ -688,6 +693,11 @@ In this example:
688693
4+a|Rows: 12
689694
|===
690695

696+
[NOTE]
697+
====
698+
The `token` action corresponds to the `NAME MANAGEMENT` privilege.
699+
====
700+
691701
`WHERE` can also be used without `YIELD`:
692702

693703
[source, cypher, role=noplay]
@@ -782,6 +792,11 @@ SHOW PRIVILEGES YIELD * RETURN role, access, collect([graph, resource, segment,
782792
3+a|Rows: 8
783793
|===
784794

795+
[NOTE]
796+
====
797+
The `token` action corresponds to the `NAME MANAGEMENT` privilege.
798+
====
799+
785800
The `RETURN` clause can also be used to order and paginate the results, which is useful when combined with `YIELD` and `WHERE`.
786801
In this example the query returns privileges for display five-per-page, and skips the first five to display the second page.
787802

modules/ROOT/pages/administration/access-control/privileges-writes.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -380,10 +380,16 @@ GRANT ALL GRAPH PRIVILEGES ON GRAPH neo4j TO regularUsers
380380

381381
[NOTE]
382382
====
383-
Unlike the more specific `READ` and `WRITE` commands, it is not possible to restrict `ALL GRAPH PRIVILEGES` to specific +ELEMENTS, +NODES+ or +RELATIONSHIPS+.
383+
Unlike the more specific `READ` and `WRITE` commands, it is not possible to restrict `ALL GRAPH PRIVILEGES` to specific +ELEMENTS+, +NODES+ or +RELATIONSHIPS+.
384384
If you wish to prevent a user from reading or writing to a subset of database objects, a `GRANT ALL GRAPH PRIVILEGES` can be combined with more specific `DENY` commands to target these elements.
385385
====
386386

387+
[NOTE]
388+
====
389+
The `ALL GRAPH PRIVILEGES` privilege does not allow creating new labels, relationship types, or property names.
390+
These are instead managed by the `NAME MANAGEMENT` privileges.
391+
====
392+
387393
The `ALL GRAPH PRIVILEGES` privilege can also be denied:
388394

389395
[source, syntax, role="noheader"]

0 commit comments

Comments
 (0)