Skip to content

Commit ba22956

Browse files
committed
fixed a few more inconsistencies
1 parent 4a756b3 commit ba22956

File tree

1 file changed

+25
-20
lines changed

1 file changed

+25
-20
lines changed

modules/ROOT/pages/database-administration/aliases/remote-database-alias-configuration.adoc

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ image::remote-alias-overview.svg[title="Overview of the required remote database
4848
A remote database alias is only accessible to users with appropriate privileges.
4949
In this example, _Bob_ is the administrator responsible for deciding which database (`db1` or `db2`) the remote aliases can write and/or read.
5050
Meanwhile, _Alice_ is the administrator that assigns who has access to the privileges set by _Bob_.
51-
In the example, _Alice_ will assign that access to _Carol_.
51+
In the example, _Alice_ assigns that access to _Carol_.
5252

5353
See xref:authentication-authorization/dbms-administration/index.adoc[DBMS privileges] for more information.
5454

@@ -75,15 +75,15 @@ CREATE USER alias_user SET PASSWORD 'secretpassword'
7575
+
7676
[source, Cypher]
7777
----
78-
CREATE ROLE remote
78+
CREATE ROLE remote_access
7979
----
8080
. Grant the necessary privileges on `db1` to the custom role and assign the role to the user profile created for the remote database alias:
8181
+
8282
[source, Cypher]
8383
----
84-
GRANT ACCESS ON DATABASE db1 TO remote
85-
GRANT MATCH {*} ON GRAPH db1 TO remote
86-
GRANT ROLE remote TO alias_user
84+
GRANT ACCESS ON DATABASE db1 TO remote_access
85+
GRANT MATCH {*} ON GRAPH db1 TO remote_access
86+
GRANT ROLE remote_access TO alias_user
8787
----
8888
. Set up the link:https://neo4j.com/docs/operations-manual/current/security/ssl-framework/[SSL framework] and check whether the database accepts non-local connections if required.
8989
+
@@ -109,7 +109,7 @@ It is recommended to create a custom role to track all users shared on a remote
109109
=== Configure the local DBMS A and grant access to Carol (_Alice_)
110110

111111
As _Alice_, you are responsible for setting up *DBMS А*.
112-
You can create and delete the database aliases and grant or deny users' access to them.
112+
You can create and delete database aliases and grant or deny users' access to them.
113113

114114
In this example, you create a remote database alias, called `db1-remote-alias`, which connects to `db1` on *DBMS B* using the credentials shared by _Bob_.
115115

@@ -180,7 +180,7 @@ bin/neo4j start --expand-commands
180180

181181
==== Create the remote database alias and grant access to Carol
182182

183-
Finally, you create the remote database alias using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[alias administrative commands].
183+
You create the remote database alias using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[alias administrative commands] and grant _Carol_ access to it.
184184

185185
[NOTE]
186186
====
@@ -190,18 +190,18 @@ By default, remote aliases require a secured URI scheme such as `neo4j+s`.
190190
However, if you want to disable the secure URL scheme, you can set the driver setting `ssl_enforced` to `false`.
191191
====
192192

193-
For example, you can use the following command to create a remote database alias with stored native credentials shared by _Bob_:
194-
193+
. Use the following command to create a remote database alias with the stored native credentials shared by _Bob_:
194+
+
195195
[source, Cypher]
196196
----
197197
CREATE ALIAS `db1-remote-alias` FOR DATABASE `db1` AT "neo4j+s://location:7687" USER alias_user PASSWORD 'secretpassword'
198198
----
199199

200-
Then, you can grant the xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] to use the remote database alias to _Carol_:
201-
200+
. Grant access to the remote database alias to the `remote_access` role and assign it to _Carol_.
201+
See xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] for more information.
202+
+
202203
[source, Cypher]
203204
----
204-
CREATE ROLE remote_access
205205
GRANT ACCESS ON DATABASE `db1-remote-alias` TO remote_access
206206
GRANT ROLE remote_access TO Carol
207207
----
@@ -236,7 +236,7 @@ image::remote-alias-credential-forwarding-overview.svg[title="Overview of the re
236236
_Carol_ logs into the local *DBMS A* through an OIDC-compliant identity provider by offering a token from the provider.
237237
The token is used to set the username and determine the identity provider groups to which the user belongs.
238238

239-
_Alice_ is the administrator of the local *DBMS A* and has set up SSO for the identity provider and configured the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
239+
_Alice_ is the administrator of the local *DBMS A* and sets up SSO for the identity provider and configures the mapping of the identity provider groups to the Neo4j roles, such that _Carol_ can use the remote database alias, `db1-remote-alias`, to connect to the remote database `db1`.
240240

241241
_Bob_ configures the remote *DBMS B* to support SSO with the same identity provider used by _Carol_ to log in to *DBMS A*.
242242
He also configures the mapping of the identity provider groups to the Neo4j roles such that the _Carol's_ identity provider groups grant the appropriate privileges to access `db1` on the *DBMS B*.
@@ -258,9 +258,9 @@ You can create and delete users and grant or deny privileges on the databases ma
258258

259259
In this example, you need to ensure that _Carol_ can access `db1` on *DBMS B* using OIDC credential forwarding.
260260

261-
. Set up SSO and support for the identity provider and map the identity provider groups to the Neo4j roles.
261+
. Set up SSO for the identity provider _Carol_ uses and map the identity provider groups to the Neo4j roles as done on the local *DBMS A*.
262262
For details, see the xref:tutorial/tutorial-sso-configuration.adoc[SSO configuration tutorial] and xref:authentication-authorization/sso-integration.adoc#auth-sso-map-idp-roles[Map the identity provider groups to the Neo4j roles].
263-
If you do not want specific users to access `db2`, here is where you set it.
263+
//If you do not want specific users to access `db2`, here is where you set it.
264264
+
265265
[parameters]
266266
----
@@ -294,7 +294,7 @@ server.bolt.tls_level=REQUIRED
294294
=== Configure the local DBMS A and grant access to Carol (_Alice_)
295295

296296
As _Alice_, you are responsible for setting up the local *DBMS A*.
297-
You can create and delete the database aliases and grant or deny users' access to them.
297+
You can create and delete database aliases and grant or deny users' access to them.
298298

299299
In this case, you need to set up a remote database alias that connects to `db1` on *DBMS B* using OIDC credential forwarding and grant _Carol_ access to it.
300300

@@ -320,29 +320,34 @@ See the xref:tutorial/tutorial-sso-configuration.adoc[SSO configuration tutorial
320320

321321
==== Create the remote database alias and grant access to Carol
322322

323-
Finally, you create the remote database alias using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[alias administrative commands].
323+
You create the remote database alias using xref:database-administration/aliases/manage-aliases-standard-databases.adoc[alias administrative commands].
324324

325-
. Create the remote database alias using OIDC credential forwarding:
326-
+
327325
[NOTE]
328326
====
329327
It is strongly recommended to connect to a remote database alias with a secured connection.
330328
Note that only client-side SSL is supported.
331329
By default, remote aliases require a secured URI scheme such as `neo4j+s`.
332330
However, if you want to disable the secure URL scheme, you can set the driver setting `ssl_enforced` to `false`.
333331
====
332+
333+
. Use the following command to create a remote database alias using OIDC credential forwarding:
334334
+
335335
[source, Cypher]
336336
----
337337
CREATE ALIAS `db1-remote-alias` FOR DATABASE `db1` AT "neo4j+s://location:7687" OIDC CREDENTIAL FORWARDING
338338
----
339339

340-
. Create a role to grant access to the remote database alias and assign it to _Carol_.
340+
. Create a custom role to track all users shared on a remote connection, so that they remain trackable:
341341
See the xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] for more information.
342342
+
343343
[source, Cypher]
344344
----
345345
CREATE ROLE remote_access
346+
----
347+
. Grant access to the remote database alias to the `remote_access` role and assign it to _Carol_.
348+
+
349+
[source, Cypher]
350+
----
346351
GRANT ACCESS ON DATABASE `db1-remote-alias` TO remote_access
347352
GRANT ROLE remote_access TO Carol
348353
----

0 commit comments

Comments
 (0)