Skip to content

Commit e434794

Browse files
Fix group-role mapping for LDAP integration (neo4j#2329) (neo4j#2336)
Co-authored-by: Olivia Ytterbrink <[email protected]>
1 parent af83c38 commit e434794

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/ROOT/pages/authentication-authorization/ldap-integration.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,8 +95,9 @@ dbms.security.authorization_providers=ldap,native
9595

9696
To assign privileges to users based on their LDAP groups, you have to map the LDAP groups to the xref:authentication-authorization/built-in-roles.adoc[Neo4j built-in] and custom-defined roles.
9797
To do that, you need to know what privileges the Neo4j roles have, and based on these privileges, to create the mapping to the groups defined in the LDAP server.
98-
The map must be formatted as a semicolon separated list of key-value pairs, where the key is a comma-separated list of the LDAP group names and the value is a comma-separated list of the corresponding role names.
99-
For example, `group1=role1;group2=role2;group3=role3,role4,role5;group4,group5=role6`.
98+
The map must be formatted as a semicolon separated list of key-value pairs, where the key is a LDAP group name and the value is a comma-separated list of the corresponding role names.
99+
100+
For example, `group1=role1;group2=role2;group3=role3,role4,role5;group4=role6;group5=role6`.
100101

101102
.Example of LDAP groups to Neo4j roles mapping
102103
====

0 commit comments

Comments
 (0)