Skip to content

Commit 9ffa139

Browse files
Update modules/ROOT/pages/tutorial/tutorial-sso-configuration.adoc
Co-authored-by: Phil Wright <[email protected]>
1 parent 70dfc13 commit 9ffa139

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/ROOT/pages/tutorial/tutorial-sso-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ dbms.security.oidc.okta.config=token_type_principal=id_token;token_type_authenti
137137
image::sso-configuration-tutorials/okta-sign-on-tab.svg[title="Okta's sign-on tab"]
138138
+
139139
. label:new[Introduced in 5.24] (Optional) If you want control the authentication and authorization on a user level, configure xref:configuration/configuration-settings.adoc#config_dbms.security.require_local_user[`dbms.security.require_local_user`] to `true` in the _neo4j.conf_ file.
140-
This setting mandates that users representing the corresponding auth provider must exist in the database before they can authenticate and authorize.
140+
This setting mandates that users with the relevant auth provider attached to them must exist in the database before they can authenticate and authorize with that auth provider.
141141
For information on how to create users in this mode, see xref:authentication-authorization/manage-users.adoc#access-control-create-users[Creating users].
142142
+
143143
For example, to create the user `jake` who can authenticate using `native` or `okta`, and authorize using Okta (as configured in step 3), you can use the following Cypher query:

0 commit comments

Comments
 (0)