You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/database-administration/aliases/remote-database-alias-configuration.adoc
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,12 +10,12 @@ Although remote database aliases do not store any data, they enable users or app
10
10
All configurations can be done using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[administrative commands] on a running system.
11
11
Any changes are automatically synchronized across all members of a cluster.
12
12
13
-
The following steps describe the setup required to define a remote database alias for both local and remote DBMSs.
14
-
They assume that you have already installed and started both DBMSs: a local *DBMS A* and a remote *DBMS B*, and that you have administrator access to both systems.
13
+
The following examples describe how to set up a remote database alias in two different ways: using stored native credentials and using OIDC credential forwarding.
14
+
It is assumed that you have two separate DBMS instances: a local *DBMS A* and a remote *DBMS B*.
15
15
16
16
By creating a remote alias, you define:
17
17
18
-
* Which user of the remote *DBMS B*is used.
18
+
* Which user of the remote *DBMS B*can access the remote alias.
19
19
* Where the remote database is located.
20
20
* How to connect to the remote database using driver settings.
21
21
@@ -31,7 +31,7 @@ The user needs to be logged in with an identity provider supporting OIDC.
31
31
32
32
In this example, _Alice_ is an administrator and _Carol_ is a user who needs access to a database managed by _Bob_.
33
33
34
-
image::remote-alias-overview.svg[title="Overview of the required remote database alias setup when using stored credentials", role="middle"]
34
+
image::remote-alias-overview.svg[title="Overview of the required remote database alias setup when using stored native credentials", role="middle"]
35
35
36
36
A remote database alias is only accessible to users with appropriate privileges.
37
37
In this example, _Bob_ is the administrator responsible for deciding which database (`db1` or `db2`) the remote aliases can write and/or read.
@@ -211,14 +211,14 @@ See the xref:authentication-authorization/sso-integration.adoc[SSO integration]
211
211
212
212
In this example, _Alice_ is an administrator and _Carol_ is a user who needs access to a database managed by _Bob_.
213
213
214
-
image::remote-alias-credential-forwarding-overview.svg[title="Overview of the required remote database alias setup when using oidc credential forwarding", role="middle"]
214
+
image::remote-alias-credential-forwarding-overview.svg[title="Overview of the required remote database alias setup when using OIDC credential forwarding", role="middle"]
215
215
216
-
_Carol_ logs into *DBMS A* through an OIDC-compliant identity provider by offering a token from the provider.
216
+
_Carol_ logs into the local *DBMS A* through an OIDC-compliant identity provider by offering a token from the provider.
217
217
The token is used to set the username and determine the identity provider groups to which the user belongs.
218
218
219
-
_Alice_ is the admin of *DBMS A* and has set up SSO for the identity provider and configured the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
219
+
_Alice_ is the admin of the local *DBMS A* and has set up SSO for the identity provider and configured the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
220
220
221
-
_Bob_ configures the *DBMS B* to support SSO with the same identity provider used by _Carol_ to log in to *DBMS A*.
221
+
_Bob_ configures the remote *DBMS B* to support SSO with the same identity provider used by _Carol_ to log in to *DBMS A*.
222
222
He also configures the mapping of the identity provider groups to the Neo4j roles such that the _Carol's_ identity provider groups grant the appropriate privileges to access `db1` on the *DBMS B*.
0 commit comments