Skip to content

Commit 19836ff

Browse files
Add links to the Components of the graph privilege commands from where HOME GRAPH is mentioned (#2102) (#2106)
Cherry-picked from #2102 Co-authored-by: NataliaIvakina <[email protected]>
1 parent cb53007 commit 19836ff

File tree

4 files changed

+17
-11
lines changed

4 files changed

+17
-11
lines changed

modules/ROOT/pages/authentication-authorization/manage-privileges.adoc

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,16 @@ For more details about the syntax descriptions, see xref:database-administration
3434
====
3535

3636
[[access-control-graph-privileges]]
37-
== Graph privilege commands (`GRANT`, `DENY`, and `REVOKE`)
37+
== Graph privilege commands
38+
39+
Administrators can use the Cypher commands `GRANT`, `DENY`, and `REVOKE` to manage Neo4j graph administrative rights.
40+
These commands can be used to grant or deny privileges to roles, and to revoke previously granted or denied privileges.
41+
The privileges can be granted or denied on the entire graph or specific elements within the graph.
42+
The privileges can also be made immutable, which means they cannot be granted, denied, or revoked unless auth is disabled.
43+
44+
[[components-of-the-graph-privilege-commands]]
45+
=== Components of the graph privilege commands
3846

39-
Administrators can use Cypher commands to manage Neo4j graph administrative rights.
4047
The components of the graph privilege commands are:
4148

4249
* _the command_:
@@ -87,6 +94,9 @@ See xref:authentication-authorization/privileges-writes.adoc[Write privileges] f
8794
* _role[, ...]_
8895
** The role or roles to associate the privilege with, comma-separated.
8996

97+
[[general-syntax-for-graph-privilege-commands]]
98+
=== General syntax for graph privilege commands
99+
90100
.General grant +ON GRAPH+ privilege syntax
91101
[cols="<15s,<85"]
92102
|===

modules/ROOT/pages/authentication-authorization/privileges-reads.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,7 @@ There are three separate read privileges:
1717
* xref:authentication-authorization/privileges-reads.adoc#access-control-privileges-reads-read[`READ`] - enables the specified properties of the found entities to be read.
1818
* xref:authentication-authorization/privileges-reads.adoc#access-control-privileges-reads-match[`MATCH`] - combines both `TRAVERSE` and `READ`, enabling an entity to be found and its properties read.
1919

20-
[NOTE]
21-
====
22-
For more details about the syntax descriptions, see xref:database-administration/syntax.adoc[].
23-
====
20+
For more details about how to read the administration commands syntax, see xref:database-administration/syntax.adoc#administration-syntax-reading[Reading the administration commands syntax] and xref:authentication-authorization/manage-privileges.adoc#components-of-the-graph-privilege-commands[Components of the graph privilege commands].
2421

2522
[[access-control-privileges-reads-traverse]]
2623
== The `TRAVERSE` privilege

modules/ROOT/pages/authentication-authorization/privileges-writes.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,7 @@ There are also compound privileges that combine the above specific privileges:
2525
* <<access-control-privileges-writes-write, `WRITE`>> - allows all `WRITE` operations on an entire graph.
2626
* <<access-control-privileges-writes-all, `ALL GRAPH PRIVILEGES`>> - allows all `READ` and `WRITE` operations on an entire graph.
2727

28-
[NOTE]
29-
====
30-
For more details about the syntax descriptions, see xref:database-administration/syntax.adoc[].
31-
====
28+
For more details about how to read the administration commands syntax, see xref:database-administration/syntax.adoc#administration-syntax-reading[Reading the administration commands syntax] and xref:authentication-authorization/manage-privileges.adoc#components-of-the-graph-privilege-commands[Components of the graph privilege commands].
3229

3330
[[access-control-privileges-writes-create]]
3431
== The `CREATE` privilege

modules/ROOT/pages/database-administration/syntax.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,8 @@ In this case, you will get either `+{ * }+` or `+{ name }+`.
4747

4848
The special characters in the table above are the only ones that need to be escaped using `"` in the syntax summaries.
4949

50-
Here is an example that uses all the special characters. It grants the `READ` privilege:
50+
Here is an example that uses all the special characters.
51+
It grants the `READ` privilege:
5152

5253
[source, syntax, role="noheader"]
5354
----
@@ -62,6 +63,7 @@ GRANT READ
6263

6364
Note that this command includes `+{+` and `+}+` in the syntax, and between them there can be a grouping of properties or the character `+*+`.
6465
It also has multiple optional parts, including the entity part of the command which is the grouping following the graph name.
66+
For details about the graph privilege commands syntax, see xref:/authentication-authorization/manage-privileges.adoc#components-of-the-graph-privilege-commands[Components of the graph privilege commands].
6567

6668
However, there is no need to escape any characters when creating a constraint for a node property.
6769
This is because `(` and `)` are not special characters, and `[` and `]` indicate that the constraint name and the `IF NOT EXISTS` parts are optional, and therefore not part of the command.

0 commit comments

Comments
 (0)