Skip to content

Commit 02db399

Browse files
authored
Fix broken links after testing (#2333)
1 parent 01cdebc commit 02db399

File tree

78 files changed

+237
-243
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

78 files changed

+237
-243
lines changed

models/hospital/access-control-old.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
When creating a database, administrators may want to establish which users have the ability to access certain information.
77

8-
As described in xref:authentication-authorization/built-in-roles/auth-built-in-roles[Built-in roles], Neo4j already offers preset roles configured to specific permissions (i.e. read, edit, or write).
8+
As described in xref:authentication-authorization/built-in-roles.adoc[Built-in roles], Neo4j already offers preset roles configured to specific permissions (i.e. read, edit, or write).
99
While these built-in roles cover many common daily scenarios, it is also possible to create custom roles for specific needs.
1010

1111
This page contains an example that illustrates various aspects of security and fine-grained access control.
@@ -85,7 +85,7 @@ This allows users to be created entirely within the database security model, a s
8585
For more information, see link:{neo4j-docs-base-uri}/cypher-manual/current/access-control/[Cypher Manual -> Access control].
8686

8787
The following examples show two different approaches to using Neo4j security features to support the _healthcare_ database application.
88-
The first approach uses xref:authentication-authorization/built-in-roles/auth-built-in-roles[Built-in roles], whereas the second uses more advanced resources with fine-grained privileges for <<auth-access-control-using-privileges, sub-graph access control>>.
88+
The first approach uses xref:authentication-authorization/built-in-roles.adoc[Built-in roles], whereas the second uses more advanced resources with fine-grained privileges for <<auth-access-control-using-privileges, sub-graph access control>>.
8989

9090
In this example, consider five users of the _healthcare_ database:
9191

modules/ROOT/pages/authentication-authorization/index.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ For more information, see xref:authentication-authorization/password-and-user-re
2828
When triggered, Neo4j logs an error containing a timestamp and the message `failed to log in: too many failed attempts` in the _security.log_.
2929
====
3030
+
31-
For the relevant Cypher commands, see xref:authentication-authorization/manage-users.adoc#access-control-user-syntax[Manage users syntax], xref:authentication-authorization/manage-roles.adoc#access-control-role-syntax[Manage roles syntax], and xref:authentication-authorization/manage-privileges.adoc#access-control-privileges-syntax[Manage privileges syntax].
31+
For the relevant Cypher commands, see xref:authentication-authorization/manage-users.adoc#access-control-user-syntax[Manage users syntax], xref:authentication-authorization/manage-roles.adoc#access-control-role-syntax[Manage roles syntax], and xref:authentication-authorization/manage-privileges.adoc[Manage privileges syntax].
3232
Various scenarios that illustrate the use of the native auth provider are available in xref:tutorial/access-control.adoc[].
3333

3434
*User auth providers*::
@@ -47,7 +47,7 @@ The configuration steps are described in xref:authentication-authorization/sso-i
4747
*Custom-built plugin auth providers*::
4848
A plugin option for building custom integrations.
4949
It is recommended that this option is used as part of a custom delivery as negotiated with link:https://neo4j.com/professional-services/[Neo4j Professional Services].
50-
For more information, see link:{neo4j-docs-base-uri}/java-reference/{page-version}/extending-neo4j/security-plugins#extending-neo4j-security-plugins[Java Reference -> Authentication and authorization plugins].
50+
For more information, see link:{neo4j-docs-base-uri}/java-reference/{page-version}/extending-neo4j/security-plugins[Java Reference -> Authentication and authorization plugins].
5151

5252
*Kerberos authentication and single sign-on*::
5353
In addition to LDAP, native, and custom providers, Neo4j supports Kerberos for authentication and single sign-on.

modules/ROOT/pages/authentication-authorization/ldap-integration.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ this LDAP group will fail authentication, even if their credentials are correct.
6565
|===
6666

6767
All settings are defined at server startup time in the default configuration file _xref:configuration/neo4j-conf.adoc[neo4j.conf]_ or can be modified at
68-
runtime using xref:procedures.adoc#procedure_dbms_setconfigvalue[`dbms.setConfigValue()`].
68+
runtime using xref:procedures.adoc#procedure_dbms_setConfigValue[`dbms.setConfigValue()`].
6969

7070

7171
[[auth-ldap-configure-provider]]
@@ -470,7 +470,7 @@ SET AUTH 'ldap' { SET ID 'cn=alice,ou=sales,dc=example,dc=com' }
470470
You can verify that your LDAP configuration is correct, and that the LDAP server responds, by using the LDAP command-line tool `ldapsearch`.
471471

472472
The `ldapsearch` command accepts the LDAP configuration setting values as input and verifies both the authentication (using the `simple` mechanism) and authorization of a user.
473-
See the https://docs.ldap.com/ldap-sdk/docs/tool-usages/ldapsearch.html[ldapsearch official documentation^] for more advanced usage and how to use SASL authentication mechanisms.
473+
See the link:https://docs.ldap.com/ldap-sdk/docs/tool-usages/ldapsearch.html[ldapsearch official documentation] for more advanced usage and how to use SASL authentication mechanisms.
474474

475475
. Verify the authentication and authorization of a user.
476476
For example, `john`.

modules/ROOT/pages/authentication-authorization/manage-execute-permissions.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The elevated privileges only apply within the procedure or user-defined function
1515
--
1616
The steps below assume that the procedure or user-defined function is already developed and installed.
1717

18-
Please refer to link:{neo4j-docs-base-uri}/java-reference/{page-version}/extending-neo4j#extending-neo4j[Java Reference -> Extending Neo4j] for a description of creating and using user-defined procedures and functions.
18+
Please refer to link:{neo4j-docs-base-uri}/java-reference/{page-version}/extending-neo4j/[Java Reference -> Extending Neo4j] for a description of creating and using user-defined procedures and functions.
1919
--
2020

2121

modules/ROOT/pages/authentication-authorization/manage-users.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -636,7 +636,7 @@ RETURN user AS adminUser
636636
[[access-control-list-user-auth-providers]]
637637
== Listing user auth providers
638638

639-
To inspect users' xref:authentication-authorization/auth-providers.adoc#access-control-list-user-auth-providers[auth providers], use `SHOW USERS WITH AUTH`.
639+
To inspect available user auth providers, use `SHOW USERS WITH AUTH`.
640640
The command produces a row per user per auth provider and yields the following two columns in addition to those output by `SHOW USERS`:
641641

642642
[options="header", width="100%", cols="1a,4,1m,^.^,^.^"]
@@ -745,6 +745,8 @@ WHERE provider = 'oidc1'
745745
746746
======
747747

748+
For more information about auth providers, see xref:authentication-authorization/auth-providers.adoc[User auth providers].
749+
748750
[[access-control-create-users]]
749751
== Creating users
750752

modules/ROOT/pages/authentication-authorization/privileges-writes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ DENY DELETE ON GRAPH * RELATIONSHIPS bar TO regularUsers
135135
[NOTE]
136136
====
137137
Users with `DELETE` privilege, but restricted `TRAVERSE` privileges, will not be able to do `DETACH DELETE` in all cases.
138-
See href:tutorial/access-control.adoc#detach-delete-restricted-user[delete restricted user] for more info.
138+
See xref:tutorial/access-control.adoc#detach-delete-restricted-user[delete restricted user] for more info.
139139
====
140140

141141
[NOTE]

modules/ROOT/pages/authentication-authorization/property-based-access-control.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To specify the property/value conditions of the privilege, you can use the follo
3131
----
3232
{GRANT | DENY | REVOKE [GRANT | DENY]}
3333
[IMMUTABLE]
34-
{MATCH | READ | TRAVERSE}
34+
{MATCH | READ | TRAVERSE}
3535
ON { HOME GRAPH | GRAPH[S] { * | name[, ...] } }
3636
[
3737
ELEMENT[S] { * | label-or-rel-type[, ...] }
@@ -50,7 +50,7 @@ To specify the property/value conditions of the privilege, you can use the follo
5050
WHERE [NOT] var.property { { = | <> | > | >= | < | <= } value | IS NULL | IS NOT NULL | IN { "["[value[, ...]]"]" | listParam } } "]"-[>]()
5151
}
5252
]
53-
{TO | FROM} role[, ...]
53+
{TO | FROM} role[, ...]
5454
----
5555

5656

@@ -173,7 +173,7 @@ This is essential when revoking property-based privileges containing evaluated f
173173

174174
[NOTE]
175175
====
176-
Not all temporal values are comparable, see link:{neo4j-docs-base-uri}/cypher-manual/current/syntax/operators/#cypher-ordering[Cypher Manual -> Syntax -> Operators -> Ordering and comparison of values].
176+
Not all temporal values are comparable, see link:{neo4j-docs-base-uri}/cypher-manual/current/values-and-types/ordering-equality-comparison[Cypher Manual -> Equality, ordering, and comparison of value types].
177177
====
178178

179179
You can show the privilege created by the command in the previous example as a revoke command by running:

modules/ROOT/pages/authentication-authorization/sso-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ dbms.security.authorization_providers=oidc-newsso,oidc-oldsso,native
150150
. Check connectivity.
151151
Neo4j needs to connect to the identity provider to discover settings and fetch public keys to verify tokens.
152152
Check firewall settings and security controls, and, if necessary, logs to ensure that the Neo4j server is able to connect to the identity provider using HTTPS.
153-
If a proxy is required, this can be https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/net/doc-files/net-properties.html#Proxies[configured] in the Java virtual machine using the configuration setting xref:configuration/configuration-settings.adoc#config_server.jvm.additional[server.jvm.additional].
153+
If a proxy is required, this can be link:https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/net/doc-files/net-properties.html#Proxies[configured] in the Java virtual machine using the configuration setting xref:configuration/configuration-settings.adoc#config_server.jvm.additional[server.jvm.additional].
154154
Proxies that require credentials are not supported.
155155

156156
[[auth-sso-map-idp-roles]]

modules/ROOT/pages/backup-restore/consistency-checker.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Value can be plain numbers, like `10000000` or e.g. `20G` for 20 gigabytes, or e
107107

108108
|--from-path-data=<path>
109109
|Path to the databases directory, containing the database directory to source from.
110-
| xref:configuration/configuration-settings.adoc#config_server.directories.data, [`server.directories.data`]/databases
110+
| xref:configuration/configuration-settings.adoc#config_server.directories.data[`server.directories.data`]/databases
111111

112112
|--from-path-txn=<path>
113113
|Path to the transactions directory, containing the transaction directory for the database to source from.

modules/ROOT/pages/backup-restore/online-backup.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ For more information, see xref:backup-restore/online-backup.adoc#online-backup-c
5656

5757
[NOTE]
5858
====
59-
`neo4j-admin database backup` is not supported in https://neo4j.com/cloud/aura/[Neo4j Aura].
59+
`neo4j-admin database backup` is not supported in link:https://neo4j.com/cloud/aura/[Neo4j Aura].
6060
====
6161

6262
[[backup-command-syntax]]
@@ -465,9 +465,9 @@ bin/neo4j-admin database backup --to-path=azb://myStorageAccount/myContainer/myD
465465
[[diff-backup-as-parent]]
466466
=== Perform a differential backup using the `--prefer-diff-as-parent` option
467467

468-
By default, a differential backup (`--type=DIFF`) uses the *most recent non-empty* backup -- whether full or differential -- in the directory as its parent.
468+
By default, a differential backup (`--type=DIFF`) uses the *most recent non-empty* backup -- whether full or differential -- in the directory as its parent.
469469

470-
The `--prefer-diff-as-parent` option changes this behavior and forces the backup job to use the *latest differential* backup as the parent, even if a newer full backup exists.
470+
The `--prefer-diff-as-parent` option changes this behavior and forces the backup job to use the *latest differential* backup as the parent, even if a newer full backup exists.
471471

472472
This approach allows you to maintain a chain of differential backups for all transactions and restore to any point in time.
473473
Without this option, the transactions between the last full backup and a previous differential backup cannot be backed up as individual transactions.

0 commit comments

Comments
 (0)