Skip to content

Commit ebeb1f6

Browse files
Docsp 4767 backport to 7.2 (#5384)
* Update source/tutorial/configure-ssl.txt Co-authored-by: ianf-mongodb <[email protected]> * Merge branch 'DOCSP-4767-to_7.1' into DOCSP-4767-latest --------- Co-authored-by: ianf-mongodb <[email protected]>
1 parent baacef1 commit ebeb1f6

File tree

4 files changed

+42
-21
lines changed

4 files changed

+42
-21
lines changed

source/reference/configuration-options.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1690,18 +1690,23 @@ Core Options
16901690

16911691
.. versionadded:: 4.2
16921692

1693-
.. include:: /includes/TLS-SSL-certificates.rst
1693+
By default, the server bypasses client certificate validation unless
1694+
the server is configured to use a CA file. If a CA file is provided, the
1695+
following rules apply:
1696+
1697+
- .. include:: /includes/TLS-SSL-certificates.rst
16941698

1695-
For clients that present a certificate, however, :binary:`~bin.mongos` or :binary:`~bin.mongod` performs
1696-
certificate validation using the root certificate chain specified by
1697-
:setting:`~net.tls.CAFile` and reject clients with invalid certificates.
1699+
- For clients that present a certificate, :binary:`~bin.mongos` or
1700+
:binary:`~bin.mongod` performs certificate validation using the root
1701+
certificate chain specified by :setting:`~net.tls.CAFile` and reject
1702+
clients with invalid certificates.
16981703

1699-
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
1700-
clients that do not or cannot present certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
1704+
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you
1705+
have a mixed deployment that includes clients that do not or cannot present
1706+
certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
17011707

17021708
.. include:: /includes/extracts/tls-facts-see-more.rst
17031709

1704-
17051710
.. setting:: net.tls.allowInvalidCertificates
17061711

17071712
*Type*: boolean

source/reference/program/mongod.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2187,18 +2187,23 @@ TLS Options
21872187

21882188
.. versionadded:: 4.2
21892189

2190-
.. include:: /includes/TLS-SSL-certificates.rst
2190+
By default, the server bypasses client certificate validation unless
2191+
the server is configured to use a CA file. If a CA file is provided, the
2192+
following rules apply:
21912193

2192-
For clients that present a certificate, however, ``mongod`` performs
2193-
certificate validation using the root certificate chain specified by
2194-
``--tlsCAFile`` and reject clients with invalid certificates.
2194+
- .. include:: /includes/TLS-SSL-certificates.rst
2195+
2196+
- For clients that present a certificate, ``mongod`` performs
2197+
certificate validation using the root certificate chain specified by
2198+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
2199+
certificates.
21952200

2196-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
2197-
clients that do not or cannot present certificates to the ``mongod``.
2201+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
2202+
a mixed deployment that includes clients that do not or cannot present
2203+
certificates to the ``mongod``.
21982204

21992205
.. include:: /includes/extracts/tls-facts-see-more.rst
22002206

2201-
22022207
.. option:: --tlsDisabledProtocols <protocol(s)>
22032208

22042209
.. versionadded:: 4.2

source/reference/program/mongos.txt

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -979,14 +979,20 @@ TLS Options
979979

980980
.. versionadded:: 4.2
981981

982-
.. include:: /includes/TLS-SSL-certificates.rst
982+
By default, the server bypasses client certificate validation unless
983+
the server is configured to use a CA file. If a CA file is provided, the
984+
following rules apply:
983985

984-
For clients that present a certificate, however, ``mongos`` performs
985-
certificate validation using the root certificate chain specified by
986-
``--tlsCAFile`` and reject clients with invalid certificates.
986+
- .. include:: /includes/TLS-SSL-certificates.rst
987+
988+
- For clients that present a certificate, ``mongos`` performs
989+
certificate validation using the root certificate chain specified by
990+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
991+
certificates.
987992

988-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
989-
clients that do not or cannot present certificates to the ``mongos``.
993+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
994+
a mixed deployment that includes clients that do not or cannot present
995+
certificates to the ``mongos``.
990996

991997
.. include:: /includes/extracts/tls-facts-see-more.rst
992998

source/tutorial/configure-ssl.txt

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Configure ``mongod`` and ``mongos`` for TLS/SSL
1313
.. contents:: On this page
1414
:local:
1515
:backlinks: none
16-
:depth: 1
16+
:depth: 2
1717
:class: singlecol
1818

1919
Overview
@@ -80,6 +80,11 @@ members, it is advisable to use different certificates on different
8080
servers. This minimizes exposure of the private key and allows for
8181
hostname validation.
8282

83+
.. note::
84+
85+
If a MongoDB deployment is not configured to use a CA file, it bypasses client
86+
certificate validation.
87+
8388
.. [#FIPS]
8489

8590
For FIPS mode, ensure that the certificate is FIPS-compliant (i.e

0 commit comments

Comments
 (0)