Skip to content

Commit 270f0ae

Browse files
committed
remove and update many more mentions of 5.x
1 parent cbcdcbb commit 270f0ae

File tree

65 files changed

+242
-261
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+242
-261
lines changed

modules/ROOT/pages/authentication-authorization/auth-providers.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
:description: This section explains how to use Cypher to manage authentication and authorization at the user level using Cypher.
2-
:page-role: enterprise-edition new-5.24
2+
:page-role: enterprise-edition
33

44
[[access-control-auth-providers]]
55
= User auth providers

modules/ROOT/pages/authentication-authorization/dbms-administration.adoc

Lines changed: 2 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1574,13 +1574,7 @@ The ability to use elevated privileges when executing a procedure can be granted
15741574
A user with this privilege will not be restricted to their other privileges when executing the procedures matched by the <<access-control-name-globbing, name-globbing>>.
15751575
The `EXECUTE BOOSTED PROCEDURE` privilege only affects the elevation, and not the execution of the procedure.
15761576
Therefore, it is needed to grant `EXECUTE PROCEDURE` privilege for the procedures as well.
1577-
1578-
1579-
[NOTE]
1580-
====
1581-
Since Neo4j 5.0, both `EXECUTE PROCEDURE` and `EXECUTE BOOSTED PROCEDURE` are needed to execute a procedure with elevated privileges.
1582-
This differs from Neo4j 4.x, when only the `EXECUTE BOOSTED PROCEDURE` is required.
1583-
====
1577+
Both `EXECUTE PROCEDURE` and `EXECUTE BOOSTED PROCEDURE` are needed to execute a procedure with elevated privileges.
15841578

15851579
[source, cypher, role=noplay]
15861580
----
@@ -1873,13 +1867,7 @@ The ability to use elevated privileges when executing a user-defined function (U
18731867
A user with this privilege will not be restricted to their other privileges when executing the UDFs matched by the <<access-control-name-globbing, name-globbing>>.
18741868
The `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege only affects the elevation and not the execution of the function.
18751869
Therefore, it is needed to grant `EXECUTE USER DEFINED FUNCTION` privilege for the functions as well.
1876-
1877-
1878-
[NOTE]
1879-
====
1880-
Since Neo4j 5.0, both `EXECUTE USER DEFINED FUNCTION` and `EXECUTE BOOSTED USER DEFINED FUNCTION` are needed to execute a function with elevated privileges.
1881-
This differs from Neo4j 4.x, when only the `EXECUTE BOOSTED USER DEFINED FUNCTION` is required.
1882-
====
1870+
oth `EXECUTE USER DEFINED FUNCTION` and `EXECUTE BOOSTED USER DEFINED FUNCTION` are needed to execute a function with elevated privileges.
18831871

18841872
[IMPORTANT]
18851873
====

modules/ROOT/pages/authentication-authorization/immutable-roles-privileges.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@
44
:description: This section explains how to use Cypher to manage immutable roles and privileges.
55

66

7-
Immutable privileges are useful for restricting the actions of users who can themselves administer xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-privilege-management[privileges].
8-
Starting with Neo4j 5.26, Neo4j also introduces immutable roles.
7+
Immutable privileges are useful for restricting the actions of users who can themselves administer xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-privilege-management[privileges].
98
Immutable roles are useful for providing _system roles_, which appear as permanent parts of the DBMS.
109

1110

@@ -38,8 +37,8 @@ The following examples demonstrate how to use Cypher to manage immutable roles a
3837

3938
=== Restricting the actions of users who can manage privileges
4039

41-
To prevent all users (including those with `PRIVILEGE MANAGEMENT` privileges) from performing *database management*, attach an immutable privilege to the `PUBLIC` role.
42-
The `PUBLIC` role implicitly and irrevocably applies to all users.
40+
To prevent all users (including those with `PRIVILEGE MANAGEMENT` privileges) from performing *database management*, attach an immutable privilege to the `PUBLIC` role.
41+
The `PUBLIC` role implicitly and irrevocably applies to all users.
4342

4443
. Ensure that you have completed steps 1 and 2 from <<administer-immutable-roles-and-privileges>>.
4544
. Run the following command to deny the `IMMUTABLE DATABASE MANAGEMENT` privilege to the `PUBLIC` role:

modules/ROOT/pages/authentication-authorization/load-privileges.adoc

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ CREATE ROLE roleLoadCidr
1111
[[access-control-load-privileges]]
1212
= Load privileges
1313

14-
_This feature is available from Neo4j 5.13._
15-
1614
This section explains how to use Cypher to manage load privileges.
1715
All load privileges apply to the whole system.
1816
Like DBMS privileges, they do not belong to one specific database or graph.
@@ -102,8 +100,6 @@ The `LOAD ON ALL DATA` privilege is granted to the `PUBLIC` role by default.
102100
[[access-control-load-cidr]]
103101
== The `CIDR` privilege
104102

105-
_This feature is available from Neo4j 5.16._
106-
107103
The load privilege on `CIDR cidr` enables or disables loading data from the given IPv4 or IPv6 CIDR range.
108104
If granted, the user can load data from sources in the given CIDR range.
109105
If missing or denied, no data can be loaded from sources in the given CIDR range.

modules/ROOT/pages/authentication-authorization/manage-privileges.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The components of the graph privilege commands are:
4848
** `IMMUTABLE` can optionally be specified when performing a `GRANT` or `DENY` to indicate that the privilege cannot be subsequently removed unless auth is disabled.
4949
Auth must also be disabled in order to `GRANT` or `DENY` an immutable privilege.
5050
Contrastingly, when `IMMUTABLE` is specified in conjunction with a `REVOKE` command, it will act as a filter and only remove matching _immutable_ privileges.
51-
Starting from Neo4j 5.26, immutable privileges can also be used together with immutable roles.
51+
Immutable privileges can also be used together with immutable roles.
5252
See xref:authentication-authorization/immutable-roles-privileges.adoc[] for more information.
5353

5454
* _graph-privilege_:

modules/ROOT/pages/authentication-authorization/manage-roles.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -340,7 +340,7 @@ For more information, see xref:authentication-authorization/dbms-administration.
340340

341341

342342
You can view all available roles using the Cypher command `SHOW ROLES`, which returns a single column by default.
343-
Starting from 5.26, you can optionally use `SHOW ROLES YIELD *` to see if the role is immutable.
343+
Optionally, you can also use `SHOW ROLES YIELD *` to see if the role is immutable.
344344
See <<access-control-immutable-roles, Immutable roles>> for more information.
345345

346346
.`SHOW ROLES` output
@@ -582,7 +582,6 @@ This is equivalent to running `DROP ROLE myrole IF EXISTS` followed by `CREATE R
582582
The `CREATE OR REPLACE ROLE` command does not allow you to use the `IF NOT EXISTS`.
583583
====
584584

585-
[role=new-in-5.26]
586585
[[access-control-immutable-roles]]
587586
== Immutable roles
588587

modules/ROOT/pages/authentication-authorization/manage-users.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -752,7 +752,6 @@ You can create users using one of the following Cypher commands, depending on wh
752752
In both cases, you can specify the user's password, whether they must change it at the next login, their status, home database, and auth provider settings.
753753
The `SET` clauses can be applied in any order.
754754
It is mandatory to specify a `SET PASSWORD` and/or at least one `SET AUTH` clause because users must have at least one auth provider.
755-
`SET AUTH` is available from Neo4j 5.24 onwards.
756755

757756
.`CREATE USER` syntax
758757
[source, syntax, role="noheader"]

modules/ROOT/pages/authentication-authorization/property-based-access-control.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ CREATE ROLE regularUsers;
77
----
88
////
99

10-
:page-role: enterprise-edition aura-db-business-critical aura-db-dedicated new-5.24
10+
:page-role: enterprise-edition aura-db-business-critical aura-db-dedicated
1111
[[property-based-access-control]]
1212
= Property-based access control
1313

@@ -106,7 +106,7 @@ GRANT READ {*} ON GRAPH * FOR (n) WHERE n.createdAt > date() TO regularUsers
106106
----
107107
[NOTE]
108108
====
109-
The `date()` function is evaluated, and the value used to evaluate the privilege is the date when the property-based privilege is created.
109+
The `date()` function is evaluated, and the value used to evaluate the privilege is the date when the property-based privilege is created.
110110
Keep this in mind when designing your property rules, and use the `SHOW PRIVILEGES AS COMMANDS` command to check the stored value.
111111
This is essential when revoking property-based privileges containing evaluated function values like `date()`.
112112
====

modules/ROOT/pages/authentication-authorization/sso-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ The default is `false`, to read the claim from the token.
114114
| xref:configuration/configuration-settings.adoc#config_dbms.security.oidc.-provider-.claims.groups[dbms.security.oidc.<provider>.claims.groups]
115115
|
116116
| true
117-
| The claim to use for the database roles. Neo4j expects to find a claim in the JWT or user_info response with this name. The claim may be a string claim representing a single role or a string array claim representing multiple roles. From Neo4j 5.4, the JWT claim may also contain a single group returned as a string as well as a list of groups as was previously required.
117+
| The claim to use for the database roles. Neo4j expects to find a claim in the JWT or user_info response with this name. The claim may be a string claim representing a single role or a string array claim representing multiple roles. The JWT claim may also contain a single group returned as a string as well as a list of groups as was previously required.
118118

119119
| xref:configuration/configuration-settings.adoc#config_dbms.security.oidc.-provider-.authorization.group_to_role_mapping[dbms.security.oidc.<provider>.authorization.group_to_role_mapping]
120120
|

modules/ROOT/pages/backup-restore/aggregate.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,13 +102,13 @@ Consult Neo4j support before use.
102102

103103
[NOTE]
104104
====
105-
The `--from-path=<path>` option can also load backup artifacts from AWS S3 buckets (from Neo4j 5.19), Google Cloud storage buckets (from Neo4j 5.21), and Azure buckets (from Neo4j 5.24).
105+
The `--from-path=<path>` option can also load backup artifacts from AWS S3 buckets, Google Cloud storage buckets, and Azure buckets.
106106
For more information, see <<aggregate-backup-cloud-storage>>.
107107
====
108108

109109
[NOTE]
110110
====
111-
Neo4j 5.24 introduces the `--temp-path` option to address potential issues related to disk space when performing backup-related commands, especially when cloud storage is involved.
111+
The `--temp-path` option addresses potential issues related to disk space when performing backup-related commands, especially when cloud storage is involved.
112112
113113
If `--temp-path` is not set, a temporary directory is created inside the directory specified by the `--from-path` option.
114114
@@ -142,7 +142,6 @@ bin/neo4j-admin database aggregate-backup --from-path=/mnt/backups/neo4j-2022-10
142142
----
143143
The command checks the `/mnt/backups/` directory for a backup chain including the file _neo4j-2022-10-18T13-00-07.backup_, for the database `neo4j`.
144144
If found, it is then aggregated into a single backup artifact.
145-
This option is only available in Neo4j 5.2 and later.
146145

147146
[[aggregate-backup-cloud-storage]]
148147
=== Aggregating a backup chain located in a cloud storage

0 commit comments

Comments
 (0)