Skip to content

Commit 69ce049

Browse files
phil198renetapopova
authored andcommitted
pr review comments
1 parent e425718 commit 69ce049

File tree

3 files changed

+17
-17
lines changed

3 files changed

+17
-17
lines changed

modules/ROOT/pages/authentication-authorization/ldap-integration.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -387,15 +387,15 @@ Conversely, when `internal.dbms.security.require_local_user` is set to `true`, u
387387
======
388388

389389

390-
.Create a user with two Auth Providers allowing the user to authenticate and authorize with either LDAP or the `oidc-mysso` provider.
390+
.Create a user with two Auth Providers allowing the user to authenticate and authorize with either LDAP or the `mysso` provider.
391391
======
392392
----
393393
CREATE USER alice
394394
SET HOME DATABASE anotherDb
395395
SET AUTH PROVIDER 'ldap' { SET ID 'cn=alice,ou=engineering,dc=example,dc=com' }
396-
SET AUTH 'oidc-mysso1' {SET ID 'alicesUniqueMySso1Id'}
396+
SET AUTH 'oidc-mysso' {SET ID 'alicesUniqueMySsoId'}
397397
----
398-
This will create a user who can authenticate and authorize using `ldap` or `oidc-mysso`. See xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO integration] for more information on setting up an OIDC provider.
398+
This will create a user who can authenticate and authorize using `ldap` or `mysso`. See xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO integration] for more information on setting up an OIDC provider.
399399
This example also illustrates that the user can have their home database set even when using only external auth providers.
400400
======
401401

modules/ROOT/pages/authentication-authorization/manage-users.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -671,7 +671,7 @@ SET PASSWORD 'abcd1234' CHANGE REQUIRED
671671
SET STATUS SUSPENDED
672672
SET HOME DATABASE anotherDb
673673
----
674-
674+
[role=label--new-5.24]
675675
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[Auth Providers] syntax would be:
676676
677677
[source,cypher,role=noplay]

modules/ROOT/pages/authentication-authorization/sso-integration.adoc

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -267,13 +267,13 @@ You need to set the `dbms.security.require_local_user` configuration setting to
267267
The following examples show how you can use Cypher to do this.
268268

269269

270-
.Create a user with an Auth Provider who can authenticate and authorize using `oidc-mysso`.
270+
.Create a user with an Auth Provider who can authenticate and authorize using `mysso`.
271271
======
272272
----
273273
CREATE USER jake
274-
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySso1Id'} // the id must match the claim that you configured via dbms.security.oidc.mysso.claims.username
274+
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // the id must match the claim that you configured via dbms.security.oidc.mysso.claims.username
275275
----
276-
This will create a user who can authenticate and authorize using `mysso` if they present a valid token with a `sub` claim of `jakesUniqueMySso1Id`.
276+
This will create a user who can authenticate and authorize using `mysso` if they present a valid token with a `sub` claim of `jakesUniqueMySsoId`.
277277
The claim used for authentication is determined by the xref:configuration/configuration-settings.adoc#config_dbms.security.oidc.-provider-.claims.username[`dbms.security.oidc.mysso.claims.username`] config setting (default the default is the `sub` claim).
278278
279279
When the `dbms.security.require_local_user` configuration setting is set to `true`, users can *only* authenticate when there is a user in the database with an Auth Provider which links to the provider that the user is trying to authenticate with.
@@ -289,10 +289,10 @@ Conversely, when `internal.dbms.security.require_local_user` is set to `true`, u
289289
----
290290
CREATE USER jake
291291
SET HOME DATABASE anotherDb
292-
SET AUTH 'oidc-mysso1' {SET ID 'jakesUniqueMySso1Id'} // this must match the claim that you configured via dbms.security.oidc.mysso1.claims.username
293-
SET AUTH 'oidc-mysso2' {SET ID 'jakesUniqueMySso2Id'} // this must match the claim that you configured via dbms.security.oidc.mysso2.claims.username
292+
SET AUTH 'oidc-mysso1' {SET ID 'jakesUniqueMySso1Id'} // `jakesUniqueMySso1Id` must match the value of the claim that you configured via dbms.security.oidc.mysso1.claims.username
293+
SET AUTH 'oidc-mysso2' {SET ID 'jakesUniqueMySso2Id'} // `jakesUniqueMySso2Id` must match the value of the claim that you configured via dbms.security.oidc.mysso2.claims.username
294294
----
295-
This will create a user who can authenticate and authorize using `oidc-mysso1` or `oidc-mysso2`.
295+
This will create a user who can authenticate and authorize using `mysso1` or `mysso2`.
296296
This example also illustrates that the user can have their home database set even when using only external auth providers.
297297
======
298298

@@ -303,7 +303,7 @@ This example also illustrates that the user can have their home database set eve
303303
ALTER USER jake
304304
REMOVE AUTH 'oidc-mysso2'
305305
----
306-
This will prevent the user from being able to authenticate and authorize with the `oidc-mysso2` provider.
306+
This will prevent the user from being able to authenticate and authorize with the `mysso2` provider.
307307
======
308308

309309
.Alter a user to allow them to authenticate and authorize using username and password
@@ -316,7 +316,7 @@ This will allow the user to authenticate and authorize using the specified usern
316316
======
317317

318318

319-
.Configure the database to allow authentication via `oidc-mysso` and authorization via the `native` provider.
319+
.Configure the database to allow authentication via `mysso` and authorization via the `native` provider.
320320
======
321321
322322
Set the following database config:
@@ -326,20 +326,20 @@ dbms.security.authentication_providers=oidc-mysso
326326
dbms.security.authorization_providers=native
327327
----
328328
329-
Then create a user with a `oidc-mysso` Auth Provider:
329+
Then create a user with a `mysso` Auth Provider:
330330
----
331331
CREATE USER jake
332332
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // this must match the claim that you configured via dbms.security.oidc.mysso.claims.username
333333
----
334334
335-
Then natively grant the `ANALYST` role to the user:
335+
Then natively grant the `READER` role to the user:
336336
----
337-
GRANT ROLE ANALYST TO alice
337+
GRANT ROLE READER TO alice
338338
----
339339
340-
This will allow the user to authenticate using `oidc-mysso` and receive the `ANALYST` role from the `native` provider.
340+
This will allow the user to authenticate using `mysso` and receive the `READER` role from the `native` provider.
341341
342-
It would also be possible to give the user the union of roles from `oidc-mysso` *and* `native` by setting `oidc-mysso` as an authorization provider too:
342+
It would also be possible to give the user the union of roles from `mysso` *and* `native` by setting `mysso` as an authorization provider too:
343343
344344
----
345345
dbms.security.authentication_providers=oidc-mysso

0 commit comments

Comments
 (0)