Skip to content

Commit 30c93f5

Browse files
committed
clean-up
1 parent 3a2d923 commit 30c93f5

File tree

4 files changed

+6
-12
lines changed

4 files changed

+6
-12
lines changed

modules/ROOT/pages/directives/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The Neo4j GraphQL Library provides the following directives to be used whilst de
1111
|===
1212
| Directive | Description
1313

14-
| xref::/security/authentication.adoc#_authentication[`@authentication`]
14+
| xref::/security/authentication.adoc[`@authentication`]
1515
| Requires authentication checks when accessing the type.
1616

1717
| xref::/security/authorization.adoc[`@authorization`]

modules/ROOT/pages/security/authentication.adoc

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ Explicit authentication, configured with the `@authentication` directive, is onl
99
Unauthenticated requests with queries requiring authentication never reach the database.
1010
====
1111

12-
== Definition
13-
14-
// tba
15-
1612
== Operations
1713

1814
Authentication can be configured to only be validated on certain operations:

modules/ROOT/pages/security/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ auth/authorization/where.adoc, authentication-and-authorization/index.adoc
1010
* xref::/security/authorization.adoc[Authorization] - Rule-based authorization filtering and validation with the `@authorization` directive.
1111
* xref::/security/subscriptions-authorization.adoc[Subscriptions authorization] - Rule-based authorization for subscriptions with the `@subscriptionsAuthorization` directive.
1212
* xref::/security/impersonation-and-user-switching.adoc[Impersonation and user switching] - How to set up impersonation and user switching features.
13-
* xref::/security/operations.adoc[Operations] - GraphQL query examples on how to trigger the evaluation of different authentication and authorization rules.
13+
* xref::/security/operations.adoc[Operation examples] - GraphQL query examples on how to trigger the evaluation of different authentication and authorization rules.

modules/ROOT/pages/security/operations.adoc

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
= Operations
1+
= Operation examples
22
//:page-aliases: /authentication-and-authorization/reference/operations.adoc, /security/reference/operations.adoc
33
:description: This page describes how to set up authorization operations in the Neo4j GraphQL Library.
44

@@ -21,9 +21,7 @@ This also applies if the directive has no arguments because `operations` default
2121

2222
The following examples apply to the `@authentication` directive, and also any rules within an `@authorization` directive.
2323

24-
== Examples
25-
26-
=== Query
24+
== Query
2725

2826
For a simple query, rules with `READ` in the operations are evaluated for any type being read:
2927

@@ -39,7 +37,7 @@ query {
3937
}
4038
----
4139

42-
=== Mutation
40+
== Mutation
4341

4442
For `create` mutations, `CREATE` rules on the object are evaluated for each node created, as well as field definition rules:
4543

@@ -105,7 +103,7 @@ mutation {
105103
}
106104
----
107105

108-
=== Subscription
106+
== Subscription
109107

110108
For a simple subscription to creation events, both `SUBSCRIBE` and `READ` operations trigger rules:
111109

0 commit comments

Comments
 (0)