Skip to content

Commit 29a0070

Browse files
committed
firther improvements
1 parent c6f1711 commit 29a0070

File tree

1 file changed

+19
-11
lines changed

1 file changed

+19
-11
lines changed

modules/ROOT/pages/database-administration/aliases/remote-database-alias-configuration.adoc

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ It is assumed that you have two separate DBMS instances: a local *DBMS A* and a
2828

2929
By creating a remote database alias, you define:
3030

31-
* Which user of the remote *DBMS B* can access the remote alias.
31+
* Which user credentials of the remote *DBMS B* can access the remote database alias.
3232
* Where the remote database is located.
3333
* How to connect to the remote database using driver settings.
3434
@@ -56,25 +56,32 @@ See xref:authentication-authorization/dbms-administration/index.adoc[DBMS privil
5656

5757
_Carol_ can use her own regular credentials to access the remote database `db1` in *DBMS B* after _Bob_ creates a user profile for her and shares the credentials with _Alice_.
5858
Then, _Alice_ will be able to grant _Carol_ access to the remote database alias `db1-remote-alias` that connects to `db1` on *DBMS B* using the shared credentials.
59-
This configuration will also allow _Carol_ to access `db2` in *DBMS B*, if _Bob_ grants the necessary privileges to the user profile shared with _Alice_.
60-
See xref:authentication-authorization/index.adoc[Authentication and authorization] for further information.
59+
//This configuration will also allow _Carol_ to access `db2` in *DBMS B*, if _Bob_ grants the necessary privileges to the user profile shared with _Alice_.
60+
//See xref:authentication-authorization/index.adoc[Authentication and authorization] for further information.
6161

62-
=== Configure the remote DBMS (_Bob_)
62+
=== Configure the remote DBMS B (_Bob_)
6363

6464
As _Bob_, you are responsible for the remote *DBMS B*.
6565
You can create and delete users and grant or deny privileges on the databases managed by *DBMS B*.
6666

6767
In this example, you create a user called `alias_user`, which will be used by the remote database alias to connect to `db1`, and shares the credentials with _Alice_.
6868

69-
. Create the user profile to share with _Alice_.
70-
. Define the permissions for the user.
71-
(If you do not want this user to access `db2`, here is where you set it.)
69+
. Create the user profile to share with _Alice_:
7270
+
73-
.Example setup administrator B
7471
[source, Cypher]
7572
----
7673
CREATE USER alias_user SET PASSWORD 'secretpassword'
74+
----
75+
. Create a custom role to track all users shared on a remote connection, so that they remain trackable:
76+
+
77+
[source, Cypher]
78+
----
7779
CREATE ROLE remote
80+
----
81+
. Grant the necessary privileges on `db1` to the custom role and assign the role to the user profile created for the remote database alias:
82+
+
83+
[source, Cypher]
84+
----
7885
GRANT ACCESS ON DATABASE db1 TO remote
7986
GRANT MATCH {*} ON GRAPH db1 TO remote
8087
GRANT ROLE remote TO alias_user
@@ -101,7 +108,7 @@ server.bolt.tls_level=REQUIRED
101108
It is recommended to create a custom role to track all users shared on a remote connection, so that they remain trackable.
102109

103110
[[remote-alias-config-DBMS_admin-A]]
104-
=== Configure a DBMS with a remote database alias (_Alice_)
111+
=== Configure the local DBMS A and grant access to Carol (_Alice_)
105112

106113
As _Alice_, you are responsible for setting up *DBMS А*.
107114
You can create and delete the database aliases and grant or deny users' access to them.
@@ -287,7 +294,7 @@ dbms.ssl.policy.bolt.client_auth=NONE
287294
server.bolt.tls_level=REQUIRED
288295
----
289296

290-
=== Configure the local DBMS A (_Alice_)
297+
=== Configure the local DBMS A and grant access to Carol (_Alice_)
291298

292299
As _Alice_, you are responsible for setting up the local *DBMS A*.
293300
You can create and delete the database aliases and grant or deny users' access to them.
@@ -333,7 +340,8 @@ However, if you want to disable the secure URL scheme, you can set the driver se
333340
CREATE ALIAS `db1-remote-alias` FOR DATABASE `db1` AT "neo4j+s://location:7687" OIDC CREDENTIAL FORWARDING
334341
----
335342

336-
. Grant the xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] to use the remote database alias to _Carol_:
343+
. Create a role to grant access to the remote database alias and assign it to _Carol_.
344+
See the xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] for more information.
337345
+
338346
[source, Cypher]
339347
----

0 commit comments

Comments
 (0)