Skip to content

Commit d998fdc

Browse files
committed
apply suggestions from review
1 parent b3319fa commit d998fdc

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/ROOT/pages/database-administration/aliases/remote-database-alias-configuration.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ It must not be accessible to any user except for the administrator and `neo4j`,
123123
====
124124

125125
In a cluster, you must share the same keystore file among all servers.
126-
For example, these would be valid additions to the config when using the suggested keytool command:
126+
For example, these would be valid additions to the configuration when using the suggested keytool command:
127127

128128
[parameters]
129129
----
@@ -149,7 +149,7 @@ chmod 640 conf/neo4j.conf
149149
bin/neo4j start --expand-commands
150150
----
151151

152-
=== Manage remote database aliases
152+
=== Manage remote database aliases (_Carol_)
153153

154154
To be able to manage remote database aliases, you must have either xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-database-management[database management]
155155
or xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-alias-management[alias management] privileges.
@@ -283,16 +283,16 @@ dbms.security.oidc.<provider>.claims.groups=groups
283283
dbms.security.oidc.<provider>.authorization.group_to_role_mapping= "engineers" = admin; \
284284
"collaborators" = reader
285285
----
286-
=== Manage remote database aliases
286+
=== Manage remote database aliases (_Carol_)
287287

288288
To be able to manage remote database aliases, you must have either xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-database-management[database management]
289289
or xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-alias-management[alias management] privileges.
290290

291-
For example, the following command grants the permission to create an alias to the `administrator` role:
291+
For example, the following command grants the permission to create an alias to the `admin` role, which _Carol_ is a member of:
292292

293293
[source, Cypher]
294294
----
295-
GRANT CREATE ALIAS ON DBMS TO administrator
295+
GRANT CREATE ALIAS ON DBMS TO admin
296296
----
297297

298298
And here is how to grant the xref:authentication-authorization/database-administration.adoc#access-control-database-administration-access[`ACCESS` privileges] to use the remote database alias:
@@ -362,4 +362,4 @@ In the case of using `STORED NATIVE CREDENTIALS`, the same credentials are used
362362
This will result in the stored native user being logged in the audit trails on the remote DBMS for all queries using the remote database alias.
363363
When using `OIDC CREDENTIAL FORWARDING`, the actual end-user's credentials and permissions are used, resulting in per-user audit trails being logged on the remote DBMS.
364364

365-
* When using a remote database alias with OIDC credential forwarding, the user needs to be logged in to the local DBMS with OIDC, otherwise there is no token to forward, and the access to the remote database will be denied with GQLSTATUS link:https://neo4j.com/docs/status-codes/current/errors/gql-errors/42NFF/[`42NFF`].
365+
* When using a remote database alias with OIDC credential forwarding, the user needs to be logged into the local *DBMS A* with OIDC, otherwise there is no token to forward, and the access to the remote database will be denied with GQLSTATUS link:https://neo4j.com/docs/status-codes/current/errors/gql-errors/42NFF/[`42NFF`].

0 commit comments

Comments
 (0)