You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/authentication-authorization/ldap-integration.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -387,15 +387,15 @@ Conversely, when `internal.dbms.security.require_local_user` is set to `true`, u
387
387
======
388
388
389
389
390
-
.Create a user with two Auth Providers allowing the user to authenticate and authorize with either LDAP or the `oidc-mysso` provider.
390
+
.Create a user with two Auth Providers allowing the user to authenticate and authorize with either LDAP or the `mysso` provider.
391
391
======
392
392
----
393
393
CREATE USER alice
394
394
SET HOME DATABASE anotherDb
395
395
SET AUTH PROVIDER 'ldap' { SET ID 'cn=alice,ou=engineering,dc=example,dc=com' }
396
-
SET AUTH 'oidc-mysso1' {SET ID 'alicesUniqueMySso1Id'}
396
+
SET AUTH 'oidc-mysso' {SET ID 'alicesUniqueMySsoId'}
397
397
----
398
-
This will create a user who can authenticate and authorize using `ldap` or `oidc-mysso`. See xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO integration] for more information on setting up an OIDC provider.
398
+
This will create a user who can authenticate and authorize using `ldap` or `mysso`. See xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO integration] for more information on setting up an OIDC provider.
399
399
This example also illustrates that the user can have their home database set even when using only external auth providers.
Copy file name to clipboardExpand all lines: modules/ROOT/pages/authentication-authorization/sso-integration.adoc
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -267,13 +267,13 @@ You need to set the `dbms.security.require_local_user` configuration setting to
267
267
The following examples show how you can use Cypher to do this.
268
268
269
269
270
-
.Create a user with an Auth Provider who can authenticate and authorize using `oidc-mysso`.
270
+
.Create a user with an Auth Provider who can authenticate and authorize using `mysso`.
271
271
======
272
272
----
273
273
CREATE USER jake
274
-
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySso1Id'} // the id must match the claim that you configured via dbms.security.oidc.mysso.claims.username
274
+
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // the id must match the claim that you configured via dbms.security.oidc.mysso.claims.username
275
275
----
276
-
This will create a user who can authenticate and authorize using `mysso` if they present a valid token with a `sub` claim of `jakesUniqueMySso1Id`.
276
+
This will create a user who can authenticate and authorize using `mysso` if they present a valid token with a `sub` claim of `jakesUniqueMySsoId`.
277
277
The claim used for authentication is determined by the xref:configuration/configuration-settings.adoc#config_dbms.security.oidc.-provider-.claims.username[`dbms.security.oidc.mysso.claims.username`] config setting (default the default is the `sub` claim).
278
278
279
279
When the `dbms.security.require_local_user` configuration setting is set to `true`, users can *only* authenticate when there is a user in the database with an Auth Provider which links to the provider that the user is trying to authenticate with.
@@ -289,10 +289,10 @@ Conversely, when `internal.dbms.security.require_local_user` is set to `true`, u
289
289
----
290
290
CREATE USER jake
291
291
SET HOME DATABASE anotherDb
292
-
SET AUTH 'oidc-mysso1' {SET ID 'jakesUniqueMySso1Id'} // this must match the claim that you configured via dbms.security.oidc.mysso1.claims.username
293
-
SET AUTH 'oidc-mysso2' {SET ID 'jakesUniqueMySso2Id'} // this must match the claim that you configured via dbms.security.oidc.mysso2.claims.username
292
+
SET AUTH 'oidc-mysso1' {SET ID 'jakesUniqueMySso1Id'} // `jakesUniqueMySso1Id` must match the value of the claim that you configured via dbms.security.oidc.mysso1.claims.username
293
+
SET AUTH 'oidc-mysso2' {SET ID 'jakesUniqueMySso2Id'} // `jakesUniqueMySso2Id` must match the value of the claim that you configured via dbms.security.oidc.mysso2.claims.username
294
294
----
295
-
This will create a user who can authenticate and authorize using `oidc-mysso1` or `oidc-mysso2`.
295
+
This will create a user who can authenticate and authorize using `mysso1` or `mysso2`.
296
296
This example also illustrates that the user can have their home database set even when using only external auth providers.
297
297
======
298
298
@@ -303,7 +303,7 @@ This example also illustrates that the user can have their home database set eve
303
303
ALTER USER jake
304
304
REMOVE AUTH 'oidc-mysso2'
305
305
----
306
-
This will prevent the user from being able to authenticate and authorize with the `oidc-mysso2` provider.
306
+
This will prevent the user from being able to authenticate and authorize with the `mysso2` provider.
307
307
======
308
308
309
309
.Alter a user to allow them to authenticate and authorize using username and password
@@ -316,7 +316,7 @@ This will allow the user to authenticate and authorize using the specified usern
316
316
======
317
317
318
318
319
-
.Configure the database to allow authentication via `oidc-mysso` and authorization via the `native` provider.
319
+
.Configure the database to allow authentication via `mysso` and authorization via the `native` provider.
Then create a user with a `oidc-mysso` Auth Provider:
329
+
Then create a user with a `mysso` Auth Provider:
330
330
----
331
331
CREATE USER jake
332
332
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // this must match the claim that you configured via dbms.security.oidc.mysso.claims.username
333
333
----
334
334
335
-
Then natively grant the `ANALYST` role to the user:
335
+
Then natively grant the `READER` role to the user:
336
336
----
337
-
GRANT ROLE ANALYST TO alice
337
+
GRANT ROLE READER TO alice
338
338
----
339
339
340
-
This will allow the user to authenticate using `oidc-mysso` and receive the `ANALYST` role from the `native` provider.
340
+
This will allow the user to authenticate using `mysso` and receive the `READER` role from the `native` provider.
341
341
342
-
It would also be possible to give the user the union of roles from `oidc-mysso` *and* `native` by setting `oidc-mysso` as an authorization provider too:
342
+
It would also be possible to give the user the union of roles from `mysso` *and* `native` by setting `mysso` as an authorization provider too:
0 commit comments