Skip to content

Commit 5f36e07

Browse files
Backport of DOCSP-4767 (#5380)
* Update source/tutorial/configure-ssl.txt Co-authored-by: ianf-mongodb <[email protected]> * Merge branch 'DOCSP-4767-to_7.1' into DOCSP-4767-latest --------- Co-authored-by: ianf-mongodb <[email protected]>
1 parent d5e6f57 commit 5f36e07

File tree

4 files changed

+42
-21
lines changed

4 files changed

+42
-21
lines changed

source/reference/configuration-options.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1639,18 +1639,23 @@ Core Options
16391639

16401640
.. versionadded:: 4.2
16411641

1642-
.. include:: /includes/TLS-SSL-certificates.rst
1642+
By default, the server bypasses client certificate validation unless
1643+
the server is configured to use a CA file. If a CA file is provided, the
1644+
following rules apply:
1645+
1646+
- .. include:: /includes/TLS-SSL-certificates.rst
16431647

1644-
For clients that present a certificate, however, :binary:`~bin.mongos` or :binary:`~bin.mongod` performs
1645-
certificate validation using the root certificate chain specified by
1646-
:setting:`~net.tls.CAFile` and reject clients with invalid certificates.
1648+
- For clients that present a certificate, :binary:`~bin.mongos` or
1649+
:binary:`~bin.mongod` performs certificate validation using the root
1650+
certificate chain specified by :setting:`~net.tls.CAFile` and reject
1651+
clients with invalid certificates.
16471652

1648-
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
1649-
clients that do not or cannot present certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
1653+
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you
1654+
have a mixed deployment that includes clients that do not or cannot present
1655+
certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
16501656

16511657
.. include:: /includes/extracts/tls-facts-see-more.rst
16521658

1653-
16541659
.. setting:: net.tls.allowInvalidCertificates
16551660

16561661
*Type*: boolean

source/reference/program/mongod.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2223,18 +2223,23 @@ TLS Options
22232223

22242224
.. versionadded:: 4.2
22252225

2226-
.. include:: /includes/TLS-SSL-certificates.rst
2226+
By default, the server bypasses client certificate validation unless
2227+
the server is configured to use a CA file. If a CA file is provided, the
2228+
following rules apply:
22272229

2228-
For clients that present a certificate, however, ``mongod`` performs
2229-
certificate validation using the root certificate chain specified by
2230-
``--tlsCAFile`` and reject clients with invalid certificates.
2230+
- .. include:: /includes/TLS-SSL-certificates.rst
2231+
2232+
- For clients that present a certificate, ``mongod`` performs
2233+
certificate validation using the root certificate chain specified by
2234+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
2235+
certificates.
22312236

2232-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
2233-
clients that do not or cannot present certificates to the ``mongod``.
2237+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
2238+
a mixed deployment that includes clients that do not or cannot present
2239+
certificates to the ``mongod``.
22342240

22352241
.. include:: /includes/extracts/tls-facts-see-more.rst
22362242

2237-
22382243
.. option:: --tlsDisabledProtocols <protocol(s)>
22392244

22402245
.. versionadded:: 4.2

source/reference/program/mongos.txt

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -979,14 +979,20 @@ TLS Options
979979

980980
.. versionadded:: 4.2
981981

982-
.. include:: /includes/TLS-SSL-certificates.rst
982+
By default, the server bypasses client certificate validation unless
983+
the server is configured to use a CA file. If a CA file is provided, the
984+
following rules apply:
983985

984-
For clients that present a certificate, however, ``mongos`` performs
985-
certificate validation using the root certificate chain specified by
986-
``--tlsCAFile`` and reject clients with invalid certificates.
986+
- .. include:: /includes/TLS-SSL-certificates.rst
987+
988+
- For clients that present a certificate, ``mongos`` performs
989+
certificate validation using the root certificate chain specified by
990+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
991+
certificates.
987992

988-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
989-
clients that do not or cannot present certificates to the ``mongos``.
993+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
994+
a mixed deployment that includes clients that do not or cannot present
995+
certificates to the ``mongos``.
990996

991997
.. include:: /includes/extracts/tls-facts-see-more.rst
992998

source/tutorial/configure-ssl.txt

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Configure ``mongod`` and ``mongos`` for TLS/SSL
99
.. contents:: On this page
1010
:local:
1111
:backlinks: none
12-
:depth: 1
12+
:depth: 2
1313
:class: singlecol
1414

1515
Overview
@@ -71,6 +71,11 @@ members, it is advisable to use different certificates on different
7171
servers. This minimizes exposure of the private key and allows for
7272
hostname validation.
7373

74+
.. note::
75+
76+
If a MongoDB deployment is not configured to use a CA file, it bypasses client
77+
certificate validation.
78+
7479
.. [#FIPS]
7580

7681
For FIPS mode, ensure that the certificate is FIPS-compliant (i.e

0 commit comments

Comments
 (0)