@@ -132,9 +132,9 @@ B. Generate the Test PEM File for Client
132132
133133 cat mongodb-test-client.crt mongodb-test-client.key > test-client.pem
134134
135- You can use the :red:`test` PEM file to configure the :binary:`~bin.mongo`
136- shell for TLS/SSL :red:`testing`. For example, to connect to a
137- :binary:`~bin.mongod` or a :binary:`~bin.mongos`:
135+ You can use the :red:`test` PEM file to configure
136+ :mongosh:`mongosh </>` for TLS/SSL :red:`testing`. For example, to
137+ connect to a :binary:`~bin.mongod` or a :binary:`~bin.mongos`:
138138
139139 .. example::
140140
@@ -163,7 +163,7 @@ B. Generate the Test PEM File for Client
163163 openssl pkcs12 -export -out test-client.pfx -inkey mongodb-test-client.key -in mongodb-test-client.crt -certfile mongodb-test-ia.crt
164164
165165 Once added to Keychain Access, instead of specifying the Certificate Key
166- file, you can use the :option:`--tlsCertificateSelector <mongo
166+ file, you can use the :option:`--tlsCertificateSelector <mongosh
167167 --tlsCertificateSelector>` to specify the certificate to use. If
168168 the CA file is also in Keychain Access, you can omit
169169 ``--tlsCAFile`` as well as in the following example:
@@ -174,8 +174,8 @@ B. Generate the Test PEM File for Client
174174
175175 mongo --tls --tlsCertificateSelector subject="<TestClientCertificateCommonName>"
176176
177- Although still available, :option:`--ssl <mongo --ssl>` and
178- :option:`--sslCertificateSelector <mongo
177+ Although still available, :option:`--ssl <mongosh --ssl>` and
178+ :option:`--sslCertificateSelector <mongosh
179179 --sslCertificateSelector>` are :ref:`deprecated as of MongoDB 4.2
180180 <4.2-tls>`.
181181
0 commit comments