You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Create/drop/show indexes and constraints along with any other future schema constructs.
50
-
* Allows executing procedures using boosted privileges.
51
-
* Allows executing admin procedures.
52
-
* Allows executing user-defined functions using boosted privileges.
50
+
* Execute procedures using boosted privileges.
51
+
* Execute admin procedures.
52
+
* Execute user-defined functions using boosted privileges.
53
53
* View/terminate queries.
54
54
* Manage databases, users, roles, and privileges.
55
55
@@ -398,15 +398,6 @@ All of the commands require that the user executing the commands has the rights
398
398
| {check-mark}
399
399
| {check-mark}
400
400
401
-
| Load data
402
-
|
403
-
|
404
-
|
405
-
|
406
-
| {check-mark}
407
-
| {check-mark}
408
-
| {check-mark}
409
-
410
401
411
402
| Execute procedures
412
403
|
@@ -449,7 +440,7 @@ All of the commands require that the user executing the commands has the rights
449
440
== The `PUBLIC` role
450
441
451
442
All users are granted the `PUBLIC` role, and it can not be revoked or dropped.
452
-
By default, it gives access to the default database and allows executing all procedures and user-defined functions.
443
+
By default, it gives access to the default database and allows loading data, executing all procedures and user-defined functions.
453
444
454
445
[IMPORTANT]
455
446
====
@@ -472,7 +463,8 @@ SHOW ROLE PUBLIC PRIVILEGES AS COMMANDS
472
463
|"GRANT ACCESS ON HOME DATABASE TO `PUBLIC`"
473
464
|"GRANT EXECUTE FUNCTION * ON DBMS TO `PUBLIC`"
474
465
|"GRANT EXECUTE PROCEDURE * ON DBMS TO `PUBLIC`"
475
-
a|Rows: 3
466
+
|"GRANT LOAD ON ALL DATA TO `PUBLIC`"
467
+
a|Rows: 4
476
468
|===
477
469
478
470
@@ -500,6 +492,11 @@ GRANT EXECUTE PROCEDURES * ON DBMS TO PUBLIC
500
492
GRANT EXECUTE USER DEFINED FUNCTIONS * ON DBMS TO PUBLIC
501
493
----
502
494
495
+
[source, cypher, role=noplay]
496
+
----
497
+
GRANT LOAD ON ALL DATA TO PUBLIC
498
+
----
499
+
503
500
The resulting `PUBLIC` role now has the same privileges as the original built-in `PUBLIC` role.
504
501
505
502
@@ -839,6 +836,7 @@ These include the rights to perform the following classes of tasks:
839
836
** Change configuration parameters.
840
837
** Manage sub-graph privileges.
841
838
** Manage procedure security.
839
+
** Manage xref:authentication-authorization/load-privileges.adoc[load privileges] to control the rights to load data from external sources.
842
840
843
841
These rights are conferred using privileges that can be managed through the xref:authentication-authorization/manage-privileges.adoc#access-control-graph-privileges[`GRANT`, `DENY` and `REVOKE` commands].
844
842
@@ -859,6 +857,7 @@ SHOW ROLE admin PRIVILEGES AS COMMANDS
859
857
|"GRANT ALL DBMS PRIVILEGES ON DBMS TO `admin`"
860
858
|"GRANT CONSTRAINT MANAGEMENT ON DATABASE * TO `admin`"
861
859
|"GRANT INDEX MANAGEMENT ON DATABASE * TO `admin`"
860
+
|"GRANT LOAD ON ALL DATA TO `admin`"
862
861
|"GRANT MATCH {*} ON GRAPH * NODE * TO `admin`"
863
862
|"GRANT MATCH {*} ON GRAPH * RELATIONSHIP * TO `admin`"
864
863
|"GRANT NAME MANAGEMENT ON DATABASE * TO `admin`"
@@ -868,7 +867,7 @@ SHOW ROLE admin PRIVILEGES AS COMMANDS
868
867
|"GRANT STOP ON DATABASE * TO `admin`"
869
868
|"GRANT TRANSACTION MANAGEMENT (*) ON DATABASE * TO `admin`"
870
869
|"GRANT WRITE ON GRAPH * TO `admin`"
871
-
a|Rows: 13
870
+
a|Rows: 14
872
871
|===
873
872
874
873
If the built-in `admin` role has been altered or dropped and needs to be restored to its original state, see xref:configuration/password-and-user-recovery[Password and user recovery].
@@ -916,6 +915,11 @@ GRANT MATCH {*} ON GRAPH * TO admin
0 commit comments