You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
or |aws|. Alternatively, implement automatic credential rotation or
212
+
create a one-time password through your PAM system for each access.
214
213
215
214
Recommendations for {+atlas-admin-api+}
216
215
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -272,10 +271,12 @@ as this makes the authorization process more secure and supports the
272
271
flexibility needed to programmatically assign :abbr:`IdP (Identity Provider)`
273
272
groups to |service| roles. You should restrict your company's domain from
274
273
preventing users from logging into |service| when they are not authorized
275
-
for access, which you can do by following the procedure in
276
-
`Manage Domain Mapping for Federated Authentication <https://www.mongodb.com/docs/atlas/security/manage-domain-mapping/>`__. From here, we recommend that you map your
277
-
:abbr:`IdP (Identity Provider)` groups to |service| roles as shown in
278
-
`Role Mapping Process <https://www.mongodb.com/docs/atlas/security/manage-role-mapping/#role-mapping-process>`__.
274
+
for access, which you can do by following the procedure in
275
+
:atlas:`Manage Domain Mapping for Federated Authentication
276
+
</security/manage-domain-mapping/>`. From here, we recommend that
277
+
you map your :abbr:`IdP (Identity Provider)` groups to |service| roles
If you have followed the standard |service| hierarchy of a single billing
281
282
organization with a linked organization for each {+BU+} or department, then
@@ -333,19 +334,20 @@ roles, predefined or custom, with permissions tailored to specific
333
334
projects or individual {+clusters+}. In staging and production
334
335
environments, we recommend using Identity Federation to streamline
335
336
access management by linking your Identity Provider (IdP) to |service|
336
-
for a more modern and
337
-
streamlined authentication and authorization flow for data access.
337
+
for a more modern and streamlined authentication and authorization flow
338
+
for data access.
338
339
339
340
Only allow workload authentication in production. You can leverage workforce
340
341
authentication during development and in lower environments. By configuring
341
-
'Group Membership' in your :abbr:`IdP (Identity Provider)`, you can map
342
-
groups to database users, simplifying access control within the
343
-
:abbr:`IdP (Identity Provider)`. However, for workload identities, we
344
-
recommend assigning roles directly using the 'users' claim instead of
345
-
'groups.' In development and test environments, you can default to the
346
-
predefined ``readWriteAny`` role to simplify the development and testing process. When moving the application to higher environments, you should build a custom
347
-
role to restrict the access that the application server has based on the
348
-
principle of least privilege.
342
+
:atlas:`Group Membership </workforce-oidc/>` in your :abbr:`IdP (Identity
343
+
Provider)`, you can map groups to database users, simplifying access
344
+
control within the :abbr:`IdP (Identity Provider)`. However, for
345
+
workload identities, we recommend assigning roles directly using the
346
+
``users`` claim instead of ``groups``. In development and test environments,
347
+
you can default to the predefined ``readWriteAny`` role to simplify the
348
+
development and testing process. When moving the application to higher
349
+
environments, you should build a custom role to restrict the access that
350
+
the application server has based on the principle of least privilege.
0 commit comments