@@ -14,7 +14,7 @@ CREATE ROLE regularUsers;
1414
1515Property-based access control grants permissions to users to read node properties based on property/value conditions.
1616Each property-based privilege can only be restricted by a single property.
17- For information about read privileges and syntax, see xref:authentication-authorization/privileges-reads.adoc[Read privileges].
17+ For information about read privileges and their syntax, see xref:authentication-authorization/privileges-reads.adoc[Read privileges].
1818
1919[IMPORTANT]
2020====
@@ -25,14 +25,26 @@ Users who can change this property can affect the granted property-based privile
2525
2626== Syntax
2727
28-
29- To specify the property/value conditions of the read privilege, you can use the following syntax for `pattern`:
28+ To specify the property/value conditions of the read privilege, you can use the following syntax:
3029
3130[source, syntax, role="noheader"]
3231----
33- ([var][:label["|" ...]] "{" property: value "}")
34- | (var[:label["|" ...]]) WHERE [NOT] var.property { { = | <> | > | >= | < | <= } value | IS NULL | IS NOT NULL | IN { "["[value[, ...]]"]" | listParam } }
35- | (var[:label["|" ...]] WHERE [NOT] var.property { { = | <> | > | >= | < | <= } value | IS NULL | IS NOT NULL | IN { "["[value[, ...]]"]" | listParam } } )
32+ GRANT|DENY [IMMUTABLE] READ|TRAVERSE|MATCH
33+ ON { HOME GRAPH | GRAPH[S] { * | name[, ...] } }
34+ [
35+ ELEMENT[S] { * | label-or-rel-type[, ...] }
36+ | NODE[S] { * | label[, ...] }
37+ | RELATIONSHIP[S] { * | rel-type[, ...] }
38+ | FOR {
39+
40+ ([var][:label["|" ...]] "{" property: value "}")
41+ | (var[:label["|" ...]])
42+ WHERE [NOT] var.property { { = | <> | > | >= | < | <= } value | IS NULL | IS NOT NULL | IN { "["[value[, ...]]"]" | listParam } }
43+ | (var[:label["|" ...]]
44+ WHERE [NOT] var.property { { = | <> | > | >= | < | <= } value | IS NULL | IS NOT NULL | IN { "["[value[, ...]]"]" | listParam } } )
45+ }
46+
47+ TO role[, ...]
3648----
3749
3850
0 commit comments