You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The xref:authentication-authorization/built-in-roles.adoc#access-control-built-in-roles-admin[`admin` role] has a number of built-in privileges.
75
75
These include:
76
76
77
-
* Create, delete, and modify databases and aliases.
77
+
* Create, delete, and modify databases.
78
78
* Change configuration parameters.
79
79
* Manage transactions.
80
80
* Manage users and roles.
@@ -159,7 +159,7 @@ CREATE ROLE customAdministrator
159
159
----
160
160
GRANT ALL DBMS PRIVILEGES ON DBMS TO customAdministrator
161
161
----
162
-
. And explicitly deny the privilege to manage databases and aliases:
162
+
. And explicitly deny the privilege to manage databases:
163
163
+
164
164
[source, cypher, role=noplay]
165
165
----
@@ -172,7 +172,7 @@ DENY DATABASE MANAGEMENT ON DBMS TO customAdministrator
172
172
GRANT TRANSACTION MANAGEMENT (*) ON DATABASE * TO customAdministrator
173
173
----
174
174
175
-
The resulting role has privileges that include all DBMS privileges except creating, dropping, and modifying databases and aliases, as well as managing transactions.
175
+
The resulting role has privileges that include all DBMS privileges except creating, dropping, and modifying databases, as well as managing transactions.
176
176
Use the following query to list all privileges for the role `customAdministrator` as commands:
177
177
178
178
[source, cypher, role=noplay]
@@ -864,19 +864,19 @@ For more details about the syntax descriptions, see xref:database-administration
864
864
GRANT [IMMUTABLE] CREATE DATABASE
865
865
ON DBMS
866
866
TO role[, ...]
867
-
| Enables the specified roles to create new standard databases and aliases.
867
+
| Enables the specified roles to create new standard databases.
868
868
869
869
| [source, syntax, role=noheader]
870
870
GRANT [IMMUTABLE] DROP DATABASE
871
871
ON DBMS
872
872
TO role[, ...]
873
-
| Enables the specified roles to delete standard databases and aliases.
873
+
| Enables the specified roles to delete standard databases.
874
874
875
875
| [source, syntax, role=noheader]
876
876
GRANT [IMMUTABLE] ALTER DATABASE
877
877
ON DBMS
878
878
TO role[, ...]
879
-
| Enables the specified roles to modify standard databases and aliases.
879
+
| Enables the specified roles to modify standard databases.
880
880
881
881
| [source, syntax, role=noheader]
882
882
GRANT [IMMUTABLE] SET DATABASE ACCESS
@@ -906,20 +906,20 @@ GRANT COMPOSITE DATABASE MANAGEMENT
906
906
GRANT [IMMUTABLE] DATABASE MANAGEMENT
907
907
ON DBMS
908
908
TO role[, ...]
909
-
| Enables the specified roles to create, delete, and modify databases and aliases.
909
+
| Enables the specified roles to create, delete, and modify databases.
910
910
911
911
|===
912
912
913
913
914
-
The ability to create standard databases and aliases can be granted via the `CREATE DATABASE` privilege.
914
+
The ability to create standard databases can be granted via the `CREATE DATABASE` privilege.
915
915
See an example:
916
916
917
917
[source, cypher, role=noplay]
918
918
----
919
919
GRANT CREATE DATABASE ON DBMS TO databaseAdder
920
920
----
921
921
922
-
The resulting role has privileges that only allow creating standard databases and aliases.
922
+
The resulting role has privileges that only allow creating standard databases.
923
923
List all privileges for the role `databaseAdder` as commands by using the following query:
924
924
925
925
[source, cypher, role=noplay]
@@ -959,15 +959,15 @@ SHOW ROLE compositeDatabaseAdder PRIVILEGES AS COMMANDS
959
959
a|Rows: 1
960
960
|===
961
961
962
-
The ability to delete standard databases and aliases can be granted via the `DROP DATABASE` privilege.
962
+
The ability to delete standard databases can be granted via the `DROP DATABASE` privilege.
963
963
See an example:
964
964
965
965
[source, cypher, role=noplay]
966
966
----
967
967
GRANT DROP DATABASE ON DBMS TO databaseDropper
968
968
----
969
969
970
-
The resulting role has privileges that only allow deleting standard databases and aliases.
970
+
The resulting role has privileges that only allow deleting standard databases.
971
971
List all privileges for the role `databaseDropper` as commands by using the following query:
972
972
973
973
[source, cypher, role=noplay]
@@ -1007,15 +1007,15 @@ SHOW ROLE compositeDatabaseDropper PRIVILEGES AS COMMANDS
1007
1007
a|Rows: 1
1008
1008
|===
1009
1009
1010
-
The ability to modify standard databases and aliases can be granted via the `ALTER DATABASE` privilege.
1010
+
The ability to modify standard databases can be granted via the `ALTER DATABASE` privilege.
1011
1011
See an example:
1012
1012
1013
1013
[source, cypher, role=noplay]
1014
1014
----
1015
1015
GRANT ALTER DATABASE ON DBMS TO databaseModifier
1016
1016
----
1017
1017
1018
-
The resulting role has privileges that only allow modifying standard databases and aliases.
1018
+
The resulting role has privileges that only allow modifying standard databases.
1019
1019
List all privileges for the role `databaseModifier` as commands by using the following query:
1020
1020
1021
1021
[source, cypher, role=noplay]
@@ -1079,7 +1079,7 @@ SHOW ROLE compositeDatabaseManager PRIVILEGES AS COMMANDS
1079
1079
a|Rows: 1
1080
1080
|===
1081
1081
1082
-
The ability to create, delete, and modify databases and aliases can be granted via the `DATABASE MANAGEMENT` privilege.
1082
+
The ability to create, delete, and modify databases can be granted via the `DATABASE MANAGEMENT` privilege.
1083
1083
See an example:
1084
1084
1085
1085
[source, cypher, role=noplay]
@@ -2005,7 +2005,7 @@ The right to perform the following privileges can be achieved with a single comm
2005
2005
2006
2006
* Create, drop, assign, remove, and show roles.
2007
2007
* Create, alter, drop, show, and impersonate users.
2008
-
* Create, alter, and drop databases and aliases.
2008
+
* Create, alter, and drop databases.
2009
2009
* Enable, alter, rename, reallocate, deallocate, and drop servers
2010
2010
* Show, assign, and remove privileges.
2011
2011
* Execute all procedures with elevated privileges.
0 commit comments