Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 16 additions & 16 deletions modules/ROOT/content-nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -71,22 +71,6 @@
** xref:constraints/syntax.adoc[]
** xref:constraints/examples.adoc[]

* xref:databases.adoc[]
* xref:aliases.adoc[]

* xref:access-control/index.adoc[]
** xref:access-control/manage-users.adoc[]
** xref:access-control/manage-roles.adoc[]
** xref:access-control/manage-privileges.adoc[]
** xref:access-control/manage-servers.adoc[]
** xref:access-control/built-in-roles.adoc[]
** xref:access-control/privileges-reads.adoc[]
** xref:access-control/privileges-writes.adoc[]
** xref:access-control/database-administration.adoc[]
** xref:access-control/dbms-administration.adoc[]
** xref:access-control/limitations.adoc[]
** xref:access-control/privileges-immutable.adoc[]

* xref:query-tuning/index.adoc[]
** xref:query-tuning/query-options.adoc[]
** xref:query-tuning/query-profile.adoc[]
Expand All @@ -101,6 +85,22 @@
** xref:execution-plans/operators.adoc[]
** xref:execution-plans/shortestpath-planning.adoc[]

* xref:administration/index.adoc[]
** xref:administration/databases.adoc[]
** xref:administration/aliases.adoc[]
** xref:administration/servers.adoc[]
** xref:administration/access-control/index.adoc[]
*** xref:administration/access-control/manage-users.adoc[]
*** xref:administration/access-control/manage-roles.adoc[]
*** xref:administration/access-control/manage-privileges.adoc[]
*** xref:administration/access-control/built-in-roles.adoc[]
*** xref:administration/access-control/privileges-reads.adoc[]
*** xref:administration/access-control/privileges-writes.adoc[]
*** xref:administration/access-control/database-administration.adoc[]
*** xref:administration/access-control/dbms-administration.adoc[]
*** xref:administration/access-control/limitations.adoc[]
*** xref:administration/access-control/privileges-immutable.adoc[]

* xref:deprecations-additions-removals-compatibility.adoc[]
* xref:keyword-glossary.adoc[]

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,12 +11,12 @@ This section explains the default privileges of the built-in roles in Neo4j and
All of the commands described in this chapter require that the user executing the commands has the rights to do so.
The privileges listed in the following sections are the default set of privileges for each built-in role:

* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-public[The `PUBLIC` role]
* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-reader[The `reader` role]
* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-editor[The `editor` role]
* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[The `publisher` role]
* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-architect[The `architect` role]
* xref::access-control/built-in-roles.adoc#access-control-built-in-roles-admin[The `admin` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-public[The `PUBLIC` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-reader[The `reader` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-editor[The `editor` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[The `publisher` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-architect[The `architect` role]
* xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-admin[The `admin` role]

[[access-control-built-in-roles-public]]
== The `PUBLIC` role
Expand Down Expand Up @@ -222,7 +222,7 @@ The resulting `editor` role now has the same privileges as the original built-in
[[access-control-built-in-roles-publisher]]
== The `publisher` role

The `publisher` role can do the same as xref::access-control/built-in-roles.adoc#access-control-built-in-roles-editor[`editor`], as well as create new labels, property keys and relationship types.
The `publisher` role can do the same as xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-editor[`editor`], as well as create new labels, property keys and relationship types.


[[access-control-built-in-roles-publisher-list]]
Expand Down Expand Up @@ -303,7 +303,7 @@ The resulting `publisher` role now has the same privileges as the original built
[[access-control-built-in-roles-architect]]
== The `architect` role

The `architect` role can do the same as the xref::access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[`publisher`], as well as create and manage indexes and constraints.
The `architect` role can do the same as the xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-publisher[`publisher`], as well as create and manage indexes and constraints.


[[access-control-built-in-roles-architect-list]]
Expand Down Expand Up @@ -396,24 +396,24 @@ The resulting `architect` role now has the same privileges as the original built
[[access-control-built-in-roles-admin]]
== The `admin` role

The `admin` role can do the same as the xref::access-control/built-in-roles.adoc#access-control-built-in-roles-architect[`architect`], as well as manage databases, aliases, users, roles and privileges.
The `admin` role can do the same as the xref::administration/access-control/built-in-roles.adoc#access-control-built-in-roles-architect[`architect`], as well as manage databases, aliases, users, roles and privileges.

The `admin` role has the ability to perform administrative tasks.
These include the rights to perform the following classes of tasks:

* Manage xref::access-control/database-administration.adoc[database security] to control the rights to perform actions on specific databases:
* Manage xref::administration/access-control/database-administration.adoc[database security] to control the rights to perform actions on specific databases:
** Manage access to a database and the right to start and stop a database.
** Manage xref::indexes-for-search-performance.adoc[indexes] and xref::constraints/index.adoc[constraints].
** Allow the creation of labels, relationship types or property names.
** Manage transactions
* Manage xref::access-control/dbms-administration.adoc[DBMS security] to control the rights to perform actions on the entire system:
** Manage xref::databases.adoc[multiple databases].
** Manage xref::access-control/manage-users.adoc[users] and xref::access-control/manage-roles.adoc[roles].
* Manage xref::administration/access-control/dbms-administration.adoc[DBMS security] to control the rights to perform actions on the entire system:
** Manage xref::administration/databases.adoc[multiple databases].
** Manage xref::administration/access-control/manage-users.adoc[users] and xref::administration/access-control/manage-roles.adoc[roles].
** Change configuration parameters.
** Manage sub-graph privileges.
** Manage procedure security.

These rights are conferred using privileges that can be managed through the xref::access-control/manage-privileges.adoc#access-control-graph-privileges[`GRANT`, `DENY` and `REVOKE` commands].
These rights are conferred using privileges that can be managed through the xref::administration/access-control/manage-privileges.adoc#access-control-graph-privileges[`GRANT`, `DENY` and `REVOKE` commands].


[[access-control-built-in-roles-admin-list]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ The components of the database privilege commands are:
* _mutability_:
** `IMMUTABLE` - When used in conjunction with `GRANT` or `DENY`, specifies that a privilege cannot subsequently be removed unless auth is disabled.
Contrastingly, when `IMMUTABLE` is specified in conjunction with a `REVOKE` command, it will act as a filter and only remove matching _immutable_ privileges.
See also xref:access-control/index.adoc#access-control-privileges-immutable[immutable privileges].
See also xref:administration/access-control/index.adoc#access-control-privileges-immutable[immutable privileges].

* _database-privilege_
** `ACCESS` - allows access to a specific database or remote database alias.
Expand Down Expand Up @@ -73,7 +73,7 @@ This can be quite powerful as it allows permissions to be switched from one data

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
More details about the syntax descriptions can be found xref:administration/index.adoc#administration-syntax[here].
====

.General grant +ON DATABASE+ privilege syntax
Expand Down Expand Up @@ -625,7 +625,7 @@ a|Rows: 6

[NOTE]
====
Note that `START` and `STOP` privileges are not included in the xref::access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
Note that `START` and `STOP` privileges are not included in the xref::administration/access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
====


Expand Down Expand Up @@ -970,7 +970,7 @@ GRANT [IMMUTABLE] TRANSACTION [MANAGEMENT] [( { * \| user[, ...] } )]

[NOTE]
====
Note that the `TRANSACTION MANAGEMENT` privileges are not included in the xref::access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
Note that the `TRANSACTION MANAGEMENT` privileges are not included in the xref::administration/access-control/database-administration.adoc#access-control-database-administration-all[`ALL DATABASE PRIVILEGES`].
====

For example, to grant the role `regularUsers` the ability to list transactions for user `jake` on the database `neo4j`, use:
Expand Down
Loading