Book Image

Learning Neo4j 3.x - Second Edition

By : Jerome Baton
Book Image

Learning Neo4j 3.x - Second Edition

By: Jerome Baton

Overview of this book

Neo4j is a graph database that allows traversing huge amounts of data with ease. This book aims at quickly getting you started with the popular graph database Neo4j. Starting with a brief introduction to graph theory, this book will show you the advantages of using graph databases along with data modeling techniques for graph databases. You'll gain practical hands-on experience with commonly used and lesser known features for updating graph store with Neo4j's Cypher query language. Furthermore, you'll also learn to create awesome procedures using APOC and extend Neo4j's functionality, enabling integration, algorithmic analysis, and other advanced spatial operation capabilities on data. Through the course of the book you will come across implementation examples on the latest updates in Neo4j, such as in-graph indexes, scaling, performance improvements, visualization, data refactoring techniques, security enhancements, and much more. By the end of the book, you'll have gained the skills to design and implement modern spatial applications, from graphing data to unraveling business capabilities with the help of real-world use cases.
Table of Contents (24 chapters)
Title Page
Credits
About the Authors
Acknowledgement
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Authentication and authorization


Authentication is the capacity for a system to ensure that who you claim to be is who you are and that you belong to the system users. This is usually realized using credentials like a login/password pair.

This pair can be managed by Neo4j or another system to which Neo4j will communicate the pair and receive a result leading to the user entering or not entering the system. These other specialized systems can be directories of the following technologies:

  • LDAP
  • Active directory
  • Kerberos (along with LDAP)

Authorization is the capacity for a system to give different levels of access to different users, from being allowed to perform inconsequential commands like changing one's password to being allowed to add users or modify the graph. In most systems, this is achieved through the use of roles.