You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This PR collects the various administrative sections currently in Cypher
Manual and places them under a new chapter heading.
This includes:
- database management
- database alias management
- server management
- access control
Also included in PR:
- xref redirects
Corresponding PRs:
Operations Manual: neo4j/docs-operations#635
Cheat sheet: neo4j/docs-cheat-sheet#71
---------
Co-authored-by: JPryce-Aklundh <[email protected]>
@@ -222,7 +222,7 @@ The resulting `editor` role now has the same privileges as the original built-in
222
222
[[access-control-built-in-roles-publisher]]
223
223
== The `publisher` role
224
224
225
-
The `publisher` role can do the same as xref::access-control/built-in-roles.adoc#access-control-built-in-roles-editor[`editor`], as well as create new labels, property keys and relationship types.
225
+
The `publisher` role can do the same as xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-editor[`editor`], as well as create new labels, property keys and relationship types.
226
226
227
227
228
228
[[access-control-built-in-roles-publisher-list]]
@@ -303,7 +303,7 @@ The resulting `publisher` role now has the same privileges as the original built
303
303
[[access-control-built-in-roles-architect]]
304
304
== The `architect` role
305
305
306
-
The `architect` role can do the same as the xref::access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[`publisher`], as well as create and manage indexes and constraints.
306
+
The `architect` role can do the same as the xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[`publisher`], as well as create and manage indexes and constraints.
307
307
308
308
309
309
[[access-control-built-in-roles-architect-list]]
@@ -396,24 +396,24 @@ The resulting `architect` role now has the same privileges as the original built
396
396
[[access-control-built-in-roles-admin]]
397
397
== The `admin` role
398
398
399
-
The `admin` role can do the same as the xref::access-control/built-in-roles.adoc#access-control-built-in-roles-architect[`architect`], as well as manage databases, aliases, users, roles and privileges.
399
+
The `admin` role can do the same as the xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-architect[`architect`], as well as manage databases, aliases, users, roles and privileges.
400
400
401
401
The `admin` role has the ability to perform administrative tasks.
402
402
These include the rights to perform the following classes of tasks:
403
403
404
-
* Manage xref::access-control/database-administration.adoc[database security] to control the rights to perform actions on specific databases:
404
+
* Manage xref::administration/access-control/database-administration.adoc[database security] to control the rights to perform actions on specific databases:
405
405
** Manage access to a database and the right to start and stop a database.
406
406
** Manage xref::indexes-for-search-performance.adoc[indexes] and xref::constraints/index.adoc[constraints].
407
407
** Allow the creation of labels, relationship types or property names.
408
408
** Manage transactions
409
-
* Manage xref::access-control/dbms-administration.adoc[DBMS security] to control the rights to perform actions on the entire system:
** Manage xref::administration/access-control/manage-users.adoc[users] and xref::administration/access-control/manage-roles.adoc[roles].
412
412
** Change configuration parameters.
413
413
** Manage sub-graph privileges.
414
414
** Manage procedure security.
415
415
416
-
These rights are conferred using privileges that can be managed through the xref::access-control/manage-privileges.adoc#access-control-graph-privileges[`GRANT`, `DENY` and `REVOKE` commands].
416
+
These rights are conferred using privileges that can be managed through the xref::administration/access-control/manage-privileges.adoc#access-control-graph-privileges[`GRANT`, `DENY` and `REVOKE` commands].
Copy file name to clipboardExpand all lines: modules/ROOT/pages/administration/access-control/database-administration.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The components of the database privilege commands are:
31
31
* _mutability_:
32
32
** `IMMUTABLE` - When used in conjunction with `GRANT` or `DENY`, specifies that a privilege cannot subsequently be removed unless auth is disabled.
33
33
Contrastingly, when `IMMUTABLE` is specified in conjunction with a `REVOKE` command, it will act as a filter and only remove matching _immutable_ privileges.
34
-
See also xref:access-control/index.adoc#access-control-privileges-immutable[immutable privileges].
34
+
See also xref:administration/access-control/index.adoc#access-control-privileges-immutable[immutable privileges].
35
35
36
36
* _database-privilege_
37
37
** `ACCESS` - allows access to a specific database or remote database alias.
@@ -73,7 +73,7 @@ This can be quite powerful as it allows permissions to be switched from one data
73
73
74
74
[NOTE]
75
75
====
76
-
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
76
+
More details about the syntax descriptions can be found xref:administration/index.adoc#administration-syntax[here].
77
77
====
78
78
79
79
.General grant +ON DATABASE+ privilege syntax
@@ -625,7 +625,7 @@ a|Rows: 6
625
625
626
626
[NOTE]
627
627
====
628
-
Note that `START` and `STOP` privileges are not included in the xref::access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
628
+
Note that `START` and `STOP` privileges are not included in the xref::administration/access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
Note that the `TRANSACTION MANAGEMENT` privileges are not included in the xref::access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
973
+
Note that the `TRANSACTION MANAGEMENT` privileges are not included in the xref::administration/access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
974
974
====
975
975
976
976
For example, to grant the role `regularUsers` the ability to list transactions for user `jake` on the database `neo4j`, use:
0 commit comments