Skip to content

Commit b3319fa

Browse files
committed
apply some suggestions from review
1 parent 77047ef commit b3319fa

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/ROOT/pages/database-administration/aliases/remote-database-alias-configuration.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ Although remote database aliases do not store any data, they enable users or app
1010
All configurations can be done using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[administrative commands] on a running system.
1111
Any changes are automatically synchronized across all members of a cluster.
1212

13-
The following steps describe the setup required to define a remote database alias for both local and remote DBMSs.
14-
They assume that you have already installed and started both DBMSs: a local *DBMS A* and a remote *DBMS B*, and that you have administrator access to both systems.
13+
The following examples describe how to set up a remote database alias in two different ways: using stored native credentials and using OIDC credential forwarding.
14+
It is assumed that you have two separate DBMS instances: a local *DBMS A* and a remote *DBMS B*.
1515

1616
By creating a remote alias, you define:
1717

18-
* Which user of the remote *DBMS B* is used.
18+
* Which user of the remote *DBMS B* can access the remote alias.
1919
* Where the remote database is located.
2020
* How to connect to the remote database using driver settings.
2121
@@ -31,7 +31,7 @@ The user needs to be logged in with an identity provider supporting OIDC.
3131

3232
In this example, _Alice_ is an administrator and _Carol_ is a user who needs access to a database managed by _Bob_.
3333

34-
image::remote-alias-overview.svg[title="Overview of the required remote database alias setup when using stored credentials", role="middle"]
34+
image::remote-alias-overview.svg[title="Overview of the required remote database alias setup when using stored native credentials", role="middle"]
3535

3636
A remote database alias is only accessible to users with appropriate privileges.
3737
In this example, _Bob_ is the administrator responsible for deciding which database (`db1` or `db2`) the remote aliases can write and/or read.
@@ -211,14 +211,14 @@ See the xref:authentication-authorization/sso-integration.adoc[SSO integration]
211211

212212
In this example, _Alice_ is an administrator and _Carol_ is a user who needs access to a database managed by _Bob_.
213213

214-
image::remote-alias-credential-forwarding-overview.svg[title="Overview of the required remote database alias setup when using oidc credential forwarding", role="middle"]
214+
image::remote-alias-credential-forwarding-overview.svg[title="Overview of the required remote database alias setup when using OIDC credential forwarding", role="middle"]
215215

216-
_Carol_ logs into *DBMS A* through an OIDC-compliant identity provider by offering a token from the provider.
216+
_Carol_ logs into the local *DBMS A* through an OIDC-compliant identity provider by offering a token from the provider.
217217
The token is used to set the username and determine the identity provider groups to which the user belongs.
218218

219-
_Alice_ is the admin of *DBMS A* and has set up SSO for the identity provider and configured the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
219+
_Alice_ is the admin of the local *DBMS A* and has set up SSO for the identity provider and configured the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
220220

221-
_Bob_ configures the *DBMS B* to support SSO with the same identity provider used by _Carol_ to log in to *DBMS A*.
221+
_Bob_ configures the remote *DBMS B* to support SSO with the same identity provider used by _Carol_ to log in to *DBMS A*.
222222
He also configures the mapping of the identity provider groups to the Neo4j roles such that the _Carol's_ identity provider groups grant the appropriate privileges to access `db1` on the *DBMS B*.
223223

224224
[CAUTION]

0 commit comments

Comments
 (0)