Skip to content

Commit 82aa4ed

Browse files
committed
fix all broken links
1 parent 0d3db51 commit 82aa4ed

25 files changed

+125
-124
lines changed

modules/ROOT/pages/authentication-authorization/built-in-roles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -830,7 +830,7 @@ These include the rights to perform the following classes of tasks:
830830
** Manage link:{neo4j-docs-base-uri}/cypher-manual/current/indexes/[indexes] and link:{neo4j-docs-base-uri}/cypher-manual/current/constraints/[constraints].
831831
** Allow the creation of labels, relationship types, or property names.
832832
** Manage transactions.
833-
* Manage xref:authentication-authorization/dbms-administration.adoc[DBMS privileges] to control the rights to perform actions on the entire system:
833+
* Manage xref:authentication-authorization/dbms-administration/index.adoc[DBMS privileges] to control the rights to perform actions on the entire system:
834834
** Manage xref:database-administration/index.adoc[multiple databases].
835835
** Manage xref:authentication-authorization/manage-users.adoc[users] and xref:authentication-authorization/manage-roles.adoc[roles].
836836
** Change configuration parameters.

modules/ROOT/pages/authentication-authorization/database-administration.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Use `REVOKE` if you want to remove a privilege.
182182

183183
Common errors, such as misspellings or attempts to revoke privileges that have not been granted or denied, will lead to notifications.
184184
In Cypher 25, notifications for impossible `REVOKE` commands, where a user, a role, or a database does not exist, have been replaced with errors.
185-
See link:{neo4j-docs-base-uri}/status-codes/{page-version}/notifications/all-notifications[Status Codes for Errors & Notifications -> Server notifications] for details on notifications.
185+
See link:https://neo4j.com/docs/status-codes/current/notifications/all-notifications/[Status Codes for Errors & Notifications -> List of notification codes] for details on notifications.
186186

187187
The hierarchy between the different database privileges is shown in the image below.
188188

@@ -679,7 +679,7 @@ Note that `START` and `STOP` privileges are not included in the xref:authenticat
679679

680680
The `ALTER DATABASE`, `SET DATABASE ACCESS`, `SET DATABASE DEFAULT LANGUAGE`, and `ALTER COMPOSITE DATABASE` privileges can be granted both as database privileges and as DBMS privileges.
681681
The DBMS privilege is equivalent to granting the database privilege for all databases, `DATABASE *`.
682-
For more information on the DBMS privilege versions, see xref:authentication-authorization/dbms-administration.adoc#access-control-dbms-administration-database-management[The `DBMS DATABASE MANAGEMENT` privileges].
682+
For more information on the DBMS privilege versions, see xref:authentication-authorization/dbms-administration/dbms-database-management-privileges.adoc[The `DBMS DATABASE MANAGEMENT` privileges].
683683

684684

685685
The `ALTER DATABASE` privilege is used to enable the ability to modify a standard database:

modules/ROOT/pages/authentication-authorization/dbms-administration/dbms-alias-management-privileges.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ TO role[, ...]
113113

114114
|===
115115

116-
=== Grant privilege to create aliases
116+
== Grant privilege to create aliases
117117

118118
You can grant the privilege to create aliases using the `CREATE ALIAS` privilege. +
119119
For example:
@@ -139,7 +139,7 @@ SHOW ROLE aliasAdder PRIVILEGES AS COMMANDS;
139139
a|Rows: 1
140140
|===
141141

142-
=== Grant privilege to delete aliases
142+
== Grant privilege to delete aliases
143143

144144
You can grant the privilege to delete aliases using the `DROP ALIAS` privilege. +
145145
For example:
@@ -165,7 +165,7 @@ SHOW ROLE aliasDropper PRIVILEGES AS COMMANDS;
165165
a|Rows: 1
166166
|===
167167

168-
=== Grant privilege to modify aliases
168+
== Grant privilege to modify aliases
169169

170170
You can grant the privilege to modify aliases using the `ALTER ALIAS` privilege. +
171171
For example:
@@ -192,7 +192,7 @@ a|Rows: 1
192192
|===
193193

194194

195-
=== Grant privilege to list aliases
195+
== Grant privilege to list aliases
196196

197197
You can grant the privilege to list aliases using the `SHOW ALIAS` privilege. +
198198
For example:
@@ -218,7 +218,7 @@ SHOW ROLE aliasViewer PRIVILEGES AS COMMANDS;
218218
a|Rows: 1
219219
|===
220220

221-
=== Grant privilege to manage aliases
221+
== Grant privilege to manage aliases
222222

223223
You can grant the privilege to create, delete, modify, and list aliases using the `ALIAS MANAGEMENT` privilege. +
224224
For example:

modules/ROOT/pages/authentication-authorization/dbms-administration/dbms-database-management-privileges.adoc

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ The DBMS privilege version is equivalent to granting the privilege for all datab
150150
For more information on the database privilege versions, see xref:authentication-authorization/database-administration.adoc#access-control-database-administration-alter-db[The alter database-related privileges].
151151
====
152152

153-
=== Grant privilege to create standard databases
153+
== Grant privilege to create standard databases
154154

155155
You can grant the privilege to create standard databases using the `CREATE DATABASE` privilege. +
156156
For example:
@@ -176,7 +176,7 @@ SHOW ROLE databaseAdder PRIVILEGES AS COMMANDS;
176176
a|Rows: 1
177177
|===
178178

179-
=== Grant privilege to create composite databases
179+
== Grant privilege to create composite databases
180180

181181
You can grant the privilege to create composite databases using the `CREATE COMPOSITE DATABASE` privilege. +
182182
For example:
@@ -202,7 +202,7 @@ SHOW ROLE compositeDatabaseAdder PRIVILEGES AS COMMANDS;
202202
a|Rows: 1
203203
|===
204204

205-
=== Grant privilege to delete standard databases
205+
== Grant privilege to delete standard databases
206206

207207
You can grant the privilege to delete standard databases using the `DROP DATABASE` privilege. +
208208
For example:
@@ -228,7 +228,7 @@ SHOW ROLE databaseDropper PRIVILEGES AS COMMANDS;
228228
a|Rows: 1
229229
|===
230230

231-
=== Grant privilege to delete composite databases
231+
== Grant privilege to delete composite databases
232232

233233
You can grant the privilege to delete composite databases using the `DROP COMPOSITE DATABASE` privilege. +
234234
For example:
@@ -254,7 +254,7 @@ SHOW ROLE compositeDatabaseDropper PRIVILEGES AS COMMANDS;
254254
a|Rows: 1
255255
|===
256256

257-
=== Grant privilege to modify standard databases
257+
== Grant privilege to modify standard databases
258258

259259
You can grant the privilege to modify standard databases using the `ALTER DATABASE` privilege. +
260260
For example:
@@ -287,7 +287,7 @@ The DBMS privilege version is equivalent to granting the privilege for all datab
287287
For more information on the database privilege versions, see xref:authentication-authorization/database-administration.adoc#access-control-database-administration-alter-db[The alter database-related privileges].
288288
====
289289

290-
=== Grant privilege to modify access to standard databases
290+
== Grant privilege to modify access to standard databases
291291

292292
You can grant the privilege to modify access to standard databases using the `SET DATABASE ACCESS` privilege. +
293293
For example:
@@ -321,7 +321,7 @@ For more information on the database privilege versions, see xref:authentication
321321
====
322322

323323
[role=label--new-2025.06]
324-
=== Grant privilege to modify the default language of standard databases
324+
== Grant privilege to modify the default language of standard databases
325325

326326
You can grant the privilege to modify the default language of standard databases using the `SET DATABASE DEFAULT LANGUAGE` privilege. +
327327
For example:
@@ -356,7 +356,7 @@ For more information on the database privilege versions, see xref:authentication
356356

357357
[role=label--new-2025.06]
358358
[[grant-privilege-alter-composite-database]]
359-
=== Grant privilege to modify composite databases
359+
== Grant privilege to modify composite databases
360360

361361
You can grant the privilege to modify composite databases using the `ALTER COMPOSITE DATABASE` privilege. +
362362
For example:
@@ -389,7 +389,7 @@ The DBMS privilege version is equivalent to granting the privilege for all datab
389389
For more information on the database privilege versions, see xref:authentication-authorization/database-administration.adoc#access-control-database-administration-alter-db[The alter database-related privileges].
390390
====
391391

392-
=== Grant privilege to manage composite databases
392+
== Grant privilege to manage composite databases
393393

394394
You can grant the privilege to create, delete, and modify composite databases using the `COMPOSITE DATABASE MANAGEMENT` privilege. +
395395
For example:
@@ -415,7 +415,7 @@ SHOW ROLE compositeDatabaseManager PRIVILEGES AS COMMANDS;
415415
a|Rows: 1
416416
|===
417417

418-
=== Grant privilege to manage standard and composite databases
418+
== Grant privilege to manage standard and composite databases
419419

420420
You can grant the privilege to create, delete, and modify standard and composite databases using the `DATABASE MANAGEMENT` privilege. +
421421
For example:

modules/ROOT/pages/authentication-authorization/dbms-administration/dbms-execute-privileges.adoc

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -114,12 +114,12 @@ GRANT [IMMUTABLE] EXECUTE BOOSTED [USER [DEFINED]] FUNCTION[S] name-globbing[, .
114114
|===
115115

116116
[[access-control-execute-procedure]]
117-
=== Grant privilege to execute procedures
117+
== Grant privilege to execute procedures
118118

119119
You can grant the privilege to execute procedures using the `EXECUTE PROCEDURE` privilege. +
120-
A role with this privilege is allowed to execute the procedures matched by the <<access-control-name-globbing, name-globbing>>.
120+
A role with this privilege is allowed to execute the procedures matched by the xref:authentication-authorization/dbms-administration/index.adoc#access-control-name-globbing[name-globbing].
121121

122-
==== Grant privilege to execute some procedures
122+
=== Grant privilege to execute some procedures
123123

124124
The following query allow the execution of procedures starting with `db.schema`:
125125

@@ -146,7 +146,7 @@ SHOW ROLE procedureExecutor PRIVILEGES AS COMMANDS;
146146
a|Rows: 1
147147
|===
148148

149-
==== Grant privilege to execute all but some procedures
149+
=== Grant privilege to execute all but some procedures
150150

151151
You can grant the privilege to execute all except a few procedures using `EXECUTE PROCEDURES *` and deny the unwanted procedures.
152152
For example, the following queries allow the execution of all procedures, except those starting with `dbms.cluster`:
@@ -185,15 +185,15 @@ The `dbms.cluster.checkConnectivity`, `dbms.cluster.cordonServer`, `dbms.cluster
185185

186186

187187
[[access-control-execute-boosted-procedure]]
188-
=== Grant privilege to execute procedures with elevated privileges
188+
== Grant privilege to execute procedures with elevated privileges
189189

190190
You can grant the privilege to execute procedures with elevated privileges using the `EXECUTE BOOSTED PROCEDURE` privilege. +
191-
A user with this privilege will not be restricted to their other privileges when executing the procedures matched by the <<access-control-name-globbing, name-globbing>>.
191+
A user with this privilege will not be restricted to their other privileges when executing the procedures matched by the xref:authentication-authorization/dbms-administration/index.adoc#access-control-name-globbing[name-globbing].
192192
The `EXECUTE BOOSTED PROCEDURE` privilege only affects the elevation, and not the execution of the procedure.
193193
Therefore, it is needed to grant `EXECUTE PROCEDURE` privilege for the procedures as well.
194194
Both `EXECUTE PROCEDURE` and `EXECUTE BOOSTED PROCEDURE` are needed to execute a procedure with elevated privileges.
195195

196-
==== Grant privilege to execute some procedures with elevated privileges
196+
=== Grant privilege to execute some procedures with elevated privileges
197197

198198
You can grant the privilege to execute some procedures with elevated privileges using `EXECUTE BOOSTED PROCEDURE *`.
199199

@@ -226,7 +226,7 @@ a|Rows: 3
226226
|===
227227

228228
[[grant-execute-procedure-deny-elevation]]
229-
==== Combination of granting execution and denying privilege elevation
229+
=== Combination of granting execution and denying privilege elevation
230230

231231
As with grant, denying `EXECUTE BOOSTED PROCEDURE` on its own only affects the elevation and not the execution of the procedure.
232232

@@ -259,7 +259,7 @@ a|Rows: 2
259259
|===
260260

261261
[[grant-privilege-elevation-deny-execution]]
262-
==== Combination of granting privilege elevation and denying execution
262+
=== Combination of granting privilege elevation and denying execution
263263

264264
You can also grant the privilege to execute procedures with elevated privileges and deny the execution of specific procedures.
265265

@@ -294,7 +294,7 @@ a|Rows: 2
294294
|===
295295

296296
[[grant-deny-privilege-elevation]]
297-
==== Combination of granting and denying privilege elevation
297+
=== Combination of granting and denying privilege elevation
298298

299299
You can also grant the privilege to execute procedures with elevated privileges and deny the elevation for specific procedures.
300300

@@ -330,7 +330,7 @@ SHOW ROLE deniedBoostedProcedureExecutor3 PRIVILEGES AS COMMANDS;
330330
a|Rows: 2
331331
|===
332332

333-
==== Control procedure output with privileges
333+
=== Control procedure output with privileges
334334

335335
You can control the output of procedures based on the privileges granted or denied to a role using the `EXECUTE PROCEDURE` and `EXECUTE BOOSTED PROCEDURE` privileges.
336336
For example, assume there is a procedure called `myProc`.
@@ -353,7 +353,7 @@ For comparison, when granted:
353353

354354

355355
[[access-control-admin-procedure]]
356-
=== Grant privilege to execute admin procedures
356+
== Grant privilege to execute admin procedures
357357

358358
Admin procedures (annotated with `@Admin`) are special in that they require elevated privileges to be executed at all.
359359
This means that to execute an admin procedure you need both the <<access-control-execute-procedure, `EXECUTE PROCEDURE`>> and <<access-control-execute-boosted-procedure, `EXECUTE BOOSTED PROCEDURE`>> privileges for that procedure.
@@ -396,18 +396,18 @@ Any denied `EXECUTE` privilege results in the procedure not being allowed to be
396396
In this case, it does not matter whether `EXECUTE PROCEDURE`, `EXECUTE BOOSTED PROCEDURE` or `EXECUTE ADMIN PROCEDURES` is being denied.
397397

398398
[[access-control-execute-user-defined-function]]
399-
=== Grant privilege to execute user-defined functions
399+
== Grant privilege to execute user-defined functions
400400

401401
//EXECUTE [USER [DEFINED]] FUNCTION[S]
402402
You can grant the privilege to execute user-defined functions (UDFs) using the `EXECUTE USER DEFINED FUNCTION` privilege.
403-
A role with this privilege is allowed to execute the UDFs matched by the <<access-control-name-globbing, name-globbing>>.
403+
A role with this privilege is allowed to execute the UDFs matched by the xref:authentication-authorization/dbms-administration/index.adoc#access-control-name-globbing[name-globbing].
404404

405405
[IMPORTANT]
406406
====
407407
The `EXECUTE USER DEFINED FUNCTION` privilege does not apply to built-in functions, which are always executable.
408408
====
409409

410-
==== Grant privilege to execute some user-defined functions
410+
=== Grant privilege to execute some user-defined functions
411411

412412
The following query shows an example of how to grant the `EXECUTE USER DEFINED FUNCTION` privilege:
413413

@@ -442,7 +442,7 @@ SHOW ROLE functionExecutor PRIVILEGES AS COMMANDS;
442442
a|Rows: 1
443443
|===
444444

445-
==== Grant privilege to execute all but some user-defined functions
445+
=== Grant privilege to execute all but some user-defined functions
446446

447447
To allow the execution of all but a few UDFs, you can grant `+EXECUTE USER DEFINED FUNCTIONS *+` and deny the unwanted UDFs.
448448
For example, the following queries allow the execution of all UDFs except those starting with `apoc.any.prop`:
@@ -490,11 +490,11 @@ a|Rows: 2
490490
The `apoc.any.property` and `apoc.any.properties` are blocked, as well as any other UDFs starting with `apoc.any.prop`.
491491

492492
[[access-control-execute-boosted-user-defined-function]]
493-
=== Grant privilege to execute user-defined functions with elevated privileges
493+
== Grant privilege to execute user-defined functions with elevated privileges
494494

495495
//EXECUTE BOOSTED [USER [DEFINED]] FUNCTION[S]
496496
You can grant the privilege to execute user-defined functions (UDFs) with elevated privileges using the `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege. +
497-
A user with this privilege will not be restricted to their other privileges when executing the UDFs matched by the <<access-control-name-globbing, name-globbing>>.
497+
A user with this privilege will not be restricted to their other privileges when executing the UDFs matched by the xref:authentication-authorization/dbms-administration/index.adoc#access-control-name-globbing[name-globbing].
498498
The `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege only affects the elevation and not the execution of the function.
499499
Therefore, it is needed to grant `EXECUTE USER DEFINED FUNCTION` privilege for the UDFs as well.
500500
Both `EXECUTE USER DEFINED FUNCTION` and `EXECUTE BOOSTED USER DEFINED FUNCTION` are needed to execute a function with elevated privileges.
@@ -504,7 +504,7 @@ Both `EXECUTE USER DEFINED FUNCTION` and `EXECUTE BOOSTED USER DEFINED FUNCTION`
504504
The `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege does not apply to built-in functions, as they have no concept of elevated privileges.
505505
====
506506

507-
==== Grant privilege to execute some user-defined functions with elevated privileges
507+
=== Grant privilege to execute some user-defined functions with elevated privileges
508508

509509
The following query shows an example of how to grant the `EXECUTE BOOSTED USER DEFINED FUNCTION` privilege:
510510

modules/ROOT/pages/authentication-authorization/dbms-administration/dbms-impersonate-privileges.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ GRANT [IMMUTABLE] IMPERSONATE (user[, ...])
9999
100100
|===
101101
102-
=== Grant privilege to impersonate all users
102+
== Grant privilege to impersonate all users
103103
104104
You can grant the privilege to impersonate all users using the `IMPERSONATE (*)` privilege. +
105105
For example:
@@ -126,7 +126,7 @@ SHOW ROLE allUserImpersonator PRIVILEGES AS COMMANDS;
126126
a|Rows: 1
127127
|===
128128
129-
=== Grant privilege to impersonate specific users
129+
== Grant privilege to impersonate specific users
130130
131131
You can also grant the privilege to impersonate specific users or a subset of users. +
132132
For example:

modules/ROOT/pages/authentication-authorization/dbms-administration/dbms-privilege-management-privileges.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ GRANT [IMMUTABLE] PRIVILEGE MANAGEMENT
106106
| Enables the specified roles to list, assign, and remove privileges.
107107
|===
108108

109-
=== Grant privilege to list privileges
109+
== Grant privilege to list privileges
110110

111111
You can grant the `SHOW PRIVILEGE` privilege to allow a user to list privileges using the `SHOW PRIVILEGE`, `SHOW ROLE roleName PRIVILEGES`, and `SHOW USER username PRIVILEGES` administration commands.
112112
The `SHOW USER username PRIVILEGES` command also requires the `SHOW USER` privilege.
@@ -142,7 +142,7 @@ If a non-native auth provider like LDAP is in use, `SHOW USER PRIVILEGES` will o
142142
Other users' privileges cannot be listed when using a non-native auth provider.
143143
====
144144

145-
=== Grant privilege to assign privileges
145+
== Grant privilege to assign privileges
146146

147147
You can grant the privilege to assign privileges using the `ASSIGN PRIVILEGE` privilege. +
148148
A user with this privilege is allowed to execute `GRANT` and `DENY` administration commands. +
@@ -169,7 +169,7 @@ SHOW ROLE privilegeAssigner PRIVILEGES AS COMMANDS;
169169
a|Rows: 1
170170
|===
171171

172-
=== Grant privilege to remove privileges
172+
== Grant privilege to remove privileges
173173

174174
You can grant the privilege to remove privileges from roles using the `REMOVE PRIVILEGE` privilege. +
175175
A user with this privilege is allowed to execute `REVOKE` administration commands. +
@@ -196,7 +196,7 @@ SHOW ROLE privilegeRemover PRIVILEGES AS COMMANDS;
196196
a|Rows: 1
197197
|===
198198

199-
=== Grant privilege to manage privileges
199+
== Grant privilege to manage privileges
200200

201201
You can grant the privilege to list, assign, and remove privileges using the `PRIVILEGE MANAGEMENT` privilege. +
202202
For example:

0 commit comments

Comments
 (0)