Skip to content

Commit c20f591

Browse files
committed
reconcile execute procedures with functions
1 parent 4e02968 commit c20f591

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

modules/ROOT/pages/authentication-authorization/dbms-administration.adoc

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1801,7 +1801,9 @@ GRANT [IMMUTABLE] EXECUTE BOOSTED [USER [DEFINED]] FUNCTION[S] name-globbing[, .
18011801
You can grant the privilege to execute procedures using the `EXECUTE PROCEDURE` privilege. +
18021802
A role with this privilege is allowed to execute the procedures matched by the <<access-control-name-globbing, name-globbing>>.
18031803

1804-
For example, the following query allow the execution of procedures starting with `db.schema`:
1804+
==== Grant privilege to execute some procedures
1805+
1806+
The following query allow the execution of procedures starting with `db.schema`:
18051807

18061808
[source, cypher, role=noplay]
18071809
----
@@ -1826,7 +1828,7 @@ SHOW ROLE procedureExecutor PRIVILEGES AS COMMANDS;
18261828
a|Rows: 1
18271829
|===
18281830

1829-
=== Grant privilege to execute all but some procedures
1831+
==== Grant privilege to execute all but some procedures
18301832

18311833
You can grant the privilege to execute all except a few procedures using `EXECUTE PROCEDURES *` and deny the unwanted procedures.
18321834
For example, the following queries allow the execution of all procedures, except those starting with `dbms.cluster`:
@@ -2083,7 +2085,7 @@ A role with this privilege is allowed to execute the UDFs matched by the <<acces
20832085
The `EXECUTE USER DEFINED FUNCTION` privilege does not apply to built-in functions, which are always executable.
20842086
====
20852087

2086-
==== Execute user-defined function
2088+
==== Grant privilege to execute some user-defined functions
20872089

20882090
The following query shows an example of how to grant the `EXECUTE USER DEFINED FUNCTION` privilege:
20892091

@@ -2118,7 +2120,7 @@ SHOW ROLE functionExecutor PRIVILEGES AS COMMANDS;
21182120
a|Rows: 1
21192121
|===
21202122

2121-
==== Grant privilege to execute execute all but some UDFs
2123+
==== Grant privilege to execute all but some user-defined functions
21222124

21232125
To allow the execution of all but a few UDFs, you can grant `+EXECUTE USER DEFINED FUNCTIONS *+` and deny the unwanted UDFs.
21242126
For example, the following queries allow the execution of all UDFs except those starting with `apoc.any.prop`:
@@ -2180,7 +2182,7 @@ Both `EXECUTE USER DEFINED FUNCTION` and `EXECUTE BOOSTED USER DEFINED FUNCTION`
21802182
The `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege does not apply to built-in functions, as they have no concept of elevated privileges.
21812183
====
21822184

2183-
==== Grant privilege to execute some UDFs with elevated privileges
2185+
==== Grant privilege to execute some user-defined functions with elevated privileges
21842186

21852187
The following query shows an example of how to grant the `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege:
21862188

modules/ROOT/pages/database-administration/aliases/manage-aliases-standard-databases.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,7 @@ FOR DATABASE
417417

418418
You can also use `IF EXISTS` or `OR REPLACE` when creating remote database aliases.
419419
It works the same way as described in the <<_use_if_exists_or_or_replace_when_creating_database_aliases, Use `IF EXISTS` or `OR REPLACE` when creating database aliases>> section.
420+
Both check for any remote or local database aliases.
420421

421422

422423
[[alias-management-create-remote-database-alias-driver-settings]]

0 commit comments

Comments
 (0)