Skip to content

Commit cfe8196

Browse files
phil198mnd999
andauthored
Apply suggestions from code review
Co-authored-by: Mark Dixon <[email protected]>
1 parent e54b57c commit cfe8196

File tree

2 files changed

+7
-4
lines changed

2 files changed

+7
-4
lines changed

modules/ROOT/pages/authentication-authorization/manage-roles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -353,7 +353,7 @@ You can view all available roles using the Cypher command `SHOW ROLES`, which re
353353
| STRING
354354

355355
| immutable
356-
| Whether the role is immutable
356+
| `true` if the role is immutable, otherwise `false`.
357357
| BOOLEAN
358358
|===
359359

modules/ROOT/pages/authentication-authorization/privileges-and-roles-immutable.adoc

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,19 @@
66

77
[NOTE]
88
====
9-
Immutable roles are newly introduced in Neo4j 5.24. Immutable privileges have been available since Neo4j 5.0.
9+
Immutable roles were introduced in Neo4j 5.24. Immutable privileges have been available since Neo4j 5.0.
1010
====
1111

1212
[[access-control-privileges-immutable-admin]]
1313
== How to administer immutable privileges and roles
1414

15-
Unlike for regular privileges and roles, immutable privileges and roles cannot be administered by users with xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-privilege-management[PRIVILEGE MANAGEMENT] and xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-role-management[ROLE MANAGEMENT] privileges. Instead, they can only be administered when auth is disabled -- that is, when the configuration setting <<config_dbms.security.auth_enabled,`dbms.security.auth_enabled`>> is set to `false`.
15+
Unlike regular privileges and roles, immutable privileges and roles cannot be administered by users with xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-privilege-management[PRIVILEGE MANAGEMENT] and xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-role-management[ROLE MANAGEMENT] privileges.
16+
Instead, they can only be administered when auth is disabled -- that is, when the configuration setting <<config_dbms.security.auth_enabled,`dbms.security.auth_enabled`>> is set to `false`.
1617

1718
[CAUTION]
18-
It is intended that administering immutable privileges and roles is an extraordinarily rare scenario and one which should be undertaken with extreme caution (i.e. when the dbms has been isolated by some other means and unauthorized access can be reliably prevented). It is considered to be the kind of action which may be performed once during the commissioning phase of a database.
19+
Immutable privileges and roles should only be used in a scenario where changes are rare.
20+
They are intentionally difficult to change and thus changes should be undertaken with caution (i.e. when the DBMS has been isolated by some other means and unauthorized access can be reliably prevented).
21+
It is considered to be the kind of action which may be performed once during the commissioning phase of a DBMS.
1922

2023
When the configuration setting <<config_dbms.security.auth_enabled,`dbms.security.auth_enabled`>> is set to `false`, immutable privileges and roles can be administered in a similar way to regular privileges and roles, using the `IMMUTABLE` keyword.
2124

0 commit comments

Comments
 (0)