@@ -30,7 +30,7 @@ or `MongoClientSettings <{+api+}/apidocs/mongodb-driver-core/com/mongodb/MongoCl
30
30
.. note:: Debugging TLS/SSL
31
31
32
32
If you experience trouble setting up your TLS/SSL connection, you can
33
- use the ``-Djavax.net.debug=all`` system property to view additional
33
+ use the ``-Djavax.net.debug=all`` system property to view more
34
34
log statements. See `the Oracle guide to debugging TLS/SSL connections
35
35
<https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ReadDebug.html>`__
36
36
for more information.
@@ -89,7 +89,7 @@ Configure Certificates
89
89
90
90
Kotlin applications that initiate TLS/SSL requests require access to
91
91
cryptographic certificates that prove identity for the application
92
- itself as well as other applications with which the application
92
+ itself and other applications with which the application
93
93
interacts. You can configure access to these certificates in your application with
94
94
the following mechanisms:
95
95
@@ -124,7 +124,7 @@ application is genuine and secure from tampering by third parties.
124
124
If your MongoDB instance uses a certificate that is signed by an
125
125
authority that is not present in the JRE's default certificate store,
126
126
your application must configure two system properties to initiate
127
- SSL/TLS requests. These properties ensure that your application is able to
127
+ SSL/TLS requests. These properties ensure that your application can
128
128
validate the TLS/SSL certificate presented by a connected MongoDB instance.
129
129
130
130
- ``javax.net.ssl.trustStore``: the path to a trust store containing the
@@ -148,8 +148,8 @@ Configure the JVM Key Store
148
148
.. note::
149
149
150
150
By default, MongoDB instances do not perform client certificate
151
- validation. You only need to configure the key store if you explicitly
152
- configured your MongoDB instance to validate client certificates.
151
+ validation. You must configure the key store if you configured your MongoDB
152
+ instance to validate client certificates.
153
153
154
154
The JVM key store saves certificates that securely identify your Kotlin
155
155
application to other applications. Using these certificates, other
@@ -168,11 +168,11 @@ the MongoDB server:
168
168
169
169
You can create a key store with the `keytool
170
170
<https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html>`__
171
- or `openssl <https://www.openssl.org/docs/apps/ openssl.html>`__ command
172
- line tools .
171
+ or `openssl <https://www.openssl.org/docs/manmaster/man1/ openssl.html>`__
172
+ command line tool .
173
173
174
174
For more information on configuring a Kotlin application to use TLS/SSL,
175
- please refer to the `JSSE Reference Guide
175
+ please see the `JSSE Reference Guide
176
176
<https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html>`__.
177
177
178
178
.. _tls-disable-hostname-verification:
@@ -195,7 +195,7 @@ Disable Hostname Verification
195
195
196
196
By default, the driver ensures that the hostname included in the server's
197
197
TLS/SSL certificates matches the hostnames provided when constructing
198
- a ``MongoClient``. If you need to disable hostname verification for your
198
+ a ``MongoClient``. To disable hostname verification for your
199
199
application, you can explicitly disable this by setting the
200
200
``invalidHostNameAllowed`` property of the builder to ``true`` in the
201
201
``applytoSslSettings()`` builder lambda:
@@ -207,7 +207,7 @@ application, you can explicitly disable this by setting the
207
207
208
208
Disabling hostname verification can make your configuration
209
209
`insecure <https://tlseminar.github.io/docs/mostdangerous.pdf>`__.
210
- You should only disable hostname verification for testing purposes or
210
+ Disable hostname verification only for testing purposes or
211
211
when there is no other alternative.
212
212
213
213
.. _tls-restrict-tls-1.2:
@@ -220,17 +220,17 @@ To restrict your application to use only the TLS 1.2 protocol, set the
220
220
221
221
.. note::
222
222
223
- Java Runtime Environments (JREs) prior to Java 8 only enabled
223
+ Java Runtime Environments (JREs) before Java 8 only enabled
224
224
the TLS 1.2 protocol in update releases. If your JRE has not enabled
225
- the TLS 1.2 protocol, you may need to upgrade to a later release to
226
- connect using TLS 1.2.
225
+ the TLS 1.2 protocol, upgrade to a later release to connect by using
226
+ TLS 1.2.
227
227
228
228
.. _tls-custom-sslContext:
229
229
230
230
Customize TLS/SSL Configuration through the Java SE SSLContext
231
231
--------------------------------------------------------------
232
232
233
- If your TLS/SSL configuration requires additional customization, you can
233
+ If your TLS/SSL configuration requires customization, you can
234
234
set the ``sslContext`` property of your ``MongoClient`` by
235
235
passing an `SSLContext
236
236
<https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLContext.html>`__
@@ -274,7 +274,7 @@ Online Certificate Status Protocol (OCSP)
274
274
275
275
OCSP is a standard used to check whether X.509 certificates have been
276
276
revoked. A certificate authority can add an X.509 certificate to the
277
- Certificate Revocation List (CRL) prior to the expiry time to invalidate
277
+ Certificate Revocation List (CRL) before the expiry time to invalidate
278
278
the certificate. When a client sends an X.509 certificate during the TLS
279
279
handshake, the CA's revocation server checks the CRL and returns a status
280
280
of "good", "revoked", or "unknown".
@@ -348,7 +348,7 @@ properties:
348
348
|
349
349
| If unset or set to ``false``, the connection can proceed regardless of the presence or status of the certificate revocation response.
350
350
351
- For additional information about OCSP, check out the following resources:
351
+ For more information about OCSP, check out the following resources:
352
352
353
353
- Oracle JDK 8 Documentation on `how to enable OCSP for an application <https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ocsp.html>`__
354
354
- :rfc:`Official IETF specification for OCSP (RFC 6960) <6960>`
0 commit comments