Custom Security Plugins & User-Defined Procedures in Neo4j Enterprise Edition [Security Series, Part 5]

When it comes to graph database security, it’s essential that you have the flexibility to customize every factor of authentication and authorization for your specific deployment. After all, no architecture or organization is the same, so you need the versatility… Learn More →

Keywords:  


Query Management & Security Event Logging in Neo4j Enterprise [Security Series, Part 4]

No matter the size or scope of your graph database, it’s vital to maintain secure control of your data and to keep a record of security events. Starting in Neo4j 3.1 and all future releases, users will have increased control… Learn More →

Keywords:  


Using the LDAP Protocol with Neo4j Enterprise Edition [Security Series, Part 3]

Neo4j 3.1 supports the LDAP protocol, so you can integrate Neo4j with Active Directory, OpenLDAP or other LDAP-compatible authentication services. Unlike with native users, management of federated users is performed through the external LDAP service. The only aspect of user… Learn More →

Keywords:  


Native User Security & Access Control in Neo4j Enterprise [Security Series, Part 2]

In Neo4j 3.1 Enterprise Edition, we introduced a new role-based access control framework for user and application access to the database. The framework enables system administrators to manage permissions and ensure that authenticated users and applications can perform only authorized… Learn More →

Keywords:  


Role-Based Access Control in Neo4j Enterprise Edition [Security Series, Part 1]

Neo4j has broken new ground in database applications with the introduction of the native graph database and the dominant labeled property graph model. As Neo4j has matured, it has inevitably found its way into demanding enterprises who value security alongside… Learn More →

Keywords:  


Graph Databases in the Enterprise: Identity & Access Management

Identity and access management (IAM) solutions store information about parties (e.g., administrators, business units, end-users) and resources (e.g., files, shares, network devices, products, agreements), along with the rules governing access to those resources. Identity management solutions then apply these rules… Learn More →

Keywords:  


GraphStarter: Get Your Neo4j Rails App Up and Running Quickly

For a while now, I’ve been building various Neo4j.rb educational resources using the example of an asset portal. There have been: A screencast series (the first half and a second half) A SitePoint article on building recommendations and access control… Learn More →

Keywords:  


Subscribe



From the CEO

Emil's Blog


Have a Graph Question?

Stackoverflow
Slack
Contact Us

Share your Graph Story?

Email us: content@neotechnology.com


Popular Graph Topics

Archives