You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/authentication-authorization/manage-roles.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -597,7 +597,7 @@ Users can be given access rights by assigning them roles using `GRANT ROLE`:
597
597
GRANT ROLE myrole TO bob
598
598
----
599
599
600
-
The roles assigned to each user can be seen on the list provided by `SHOW USERS`:
600
+
The roles assigned to each user can be seen on the list provided by xref:authentication-authorization/manage-users.adoc#access-control-list-users[`SHOW USERS`]:
@@ -496,15 +502,19 @@ Available users can be seen using `SHOW USERS`, which will produce a table of us
496
502
| {check-mark}
497
503
498
504
| roles
499
-
| Roles granted to the user.
505
+
| Native roles granted to the user using the `GRANT ROLE` command.
506
+
507
+
This is not necessarily the set of roles that a user will receive in practice. The latter depends on DMBS configuration as well as the user's xref:authentication-authorization/auth-providers.adoc[Auth Providers].
508
+
509
+
Examples of where a user would receive a different set of roles from that which appears in this column would include cases where they use external (e.g. LDAP or OIDC) auth, or where they do not have the `native` xref:authentication-authorization/auth-providers.adoc[Auth Provider].
500
510
501
511
Will return `null` in community edition.
502
512
| LIST OF STRING
503
513
| {cross-mark}
504
514
| {check-mark}
505
515
506
516
| passwordChangeRequired
507
-
| If `true`, the user must change their password at the next login.
517
+
| If `true`, the user must change their password at the next login. This will be null if the user has `native` auth disabled.
508
518
| BOOLEAN
509
519
| {check-mark}
510
520
| {check-mark}
@@ -528,6 +538,7 @@ Will return `null` in community edition.
528
538
| {check-mark}
529
539
|===
530
540
541
+
531
542
[source, cypher, role=noplay]
532
543
----
533
544
SHOW USERS
@@ -547,12 +558,91 @@ SHOW USERS
547
558
|false
548
559
|false
549
560
|<null>
561
+
|"jake"
562
+
|["PUBLIC"]
563
+
|false
564
+
|false
565
+
|<null>
566
+
5+a|Rows: 2
567
+
|===
550
568
551
-
5+a|Rows: 1
569
+
To inspect users' xref:authentication-authorization/auth-providers.adoc[Auth Providers], use `SHOW USERS WITH AUTH`. This command will produce a row per user per Auth Provider and will yield the following two columns in addition to those output by `SHOW USERS`:
| A map containing configuration for the user. E.g. dn of the user for an `ldap` auth provider, the unique external identifier for an `oidc` auth provider, or password status for a native auth provider.
When first starting a Neo4j DBMS, there is always a single default user `neo4j` with administrative privileges.
555
644
It is possible to set the initial password using xref:configuration/set-initial-password.adoc[`neo4j-admin dbms set-initial-password <password>`], otherwise it is necessary to change the password after the first login.
645
+
====
556
646
557
647
.Show user
558
648
======
@@ -581,6 +671,16 @@ RETURN user AS adminUser
581
671
----
582
672
======
583
673
674
+
.Show user with auth
675
+
======
676
+
Show all of the users with the `oidc` Auth Provider.
677
+
[source,cypher,role=noplay]
678
+
----
679
+
SHOW USERS WITH AUTH
680
+
WHERE provider = 'oidc1'
681
+
----
682
+
======
683
+
584
684
[NOTE]
585
685
====
586
686
The `SHOW USER name PRIVILEGES` command is described in xref:authentication-authorization/manage-privileges.adoc#access-control-list-privileges[Listing privileges].
0 commit comments