In contrast, MongoDB employs a more complex user directory structure. In such an approach, the user directory is flat, which means that for the entire database server each username must be unique. When connecting to a database with valid credentials, the user is authenticated and granted the level of access associated with that user. In many database management systems, users are identified with just a username and password pair. The following subsections expand on how MongoDB handles authentication and authorization. Authorization, on the other hand, involves setting rules for a given user or group of users to define what actions they can perform and which resources they can access. Authentication is the process of confirming whether a user or client is actually who they claim to be. To better understand access control in MongoDB, it can be helpful to first distinguish it from a different but closely related concept: authentication. How MongoDB Controls Access with Role-Based Access ControlĪccess control - also known as authorization - is a security technique that involves determining who can gain access to which resources. It will generally work with any MongoDB installation regardless of the operating system as long as authentication has been enabled. This tutorial concentrates on MongoDB itself, not the underlying operating system. Note: The example tutorials on how to configure your server, install and then secure MongoDB installation refer to Ubuntu 20.04. To secure MongoDB like this, follow our tutorial on How To Secure MongoDB on Ubuntu 20.04.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |