File tree Expand file tree Collapse file tree 4 files changed +42
-21
lines changed Expand file tree Collapse file tree 4 files changed +42
-21
lines changed Original file line number Diff line number Diff line change @@ -1690,18 +1690,23 @@ Core Options
16901690
16911691 .. versionadded:: 4.2
16921692
1693- .. include:: /includes/TLS-SSL-certificates.rst
1693+ By default, the server bypasses client certificate validation unless
1694+ the server is configured to use a CA file. If a CA file is provided, the
1695+ following rules apply:
1696+
1697+ - .. include:: /includes/TLS-SSL-certificates.rst
16941698
1695- For clients that present a certificate, however, :binary:`~bin.mongos` or :binary:`~bin.mongod` performs
1696- certificate validation using the root certificate chain specified by
1697- :setting:`~net.tls.CAFile` and reject clients with invalid certificates.
1699+ - For clients that present a certificate, :binary:`~bin.mongos` or
1700+ :binary:`~bin.mongod` performs certificate validation using the root
1701+ certificate chain specified by :setting:`~net.tls.CAFile` and reject
1702+ clients with invalid certificates.
16981703
1699- Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
1700- clients that do not or cannot present certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
1704+ Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you
1705+ have a mixed deployment that includes clients that do not or cannot present
1706+ certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
17011707
17021708 .. include:: /includes/extracts/tls-facts-see-more.rst
17031709
1704-
17051710.. setting:: net.tls.allowInvalidCertificates
17061711
17071712 *Type*: boolean
Original file line number Diff line number Diff line change @@ -2187,18 +2187,23 @@ TLS Options
21872187
21882188 .. versionadded:: 4.2
21892189
2190- .. include:: /includes/TLS-SSL-certificates.rst
2190+ By default, the server bypasses client certificate validation unless
2191+ the server is configured to use a CA file. If a CA file is provided, the
2192+ following rules apply:
21912193
2192- For clients that present a certificate, however, ``mongod`` performs
2193- certificate validation using the root certificate chain specified by
2194- ``--tlsCAFile`` and reject clients with invalid certificates.
2194+ - .. include:: /includes/TLS-SSL-certificates.rst
2195+
2196+ - For clients that present a certificate, ``mongod`` performs
2197+ certificate validation using the root certificate chain specified by
2198+ :option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
2199+ certificates.
21952200
2196- Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
2197- clients that do not or cannot present certificates to the ``mongod``.
2201+ Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
2202+ a mixed deployment that includes clients that do not or cannot present
2203+ certificates to the ``mongod``.
21982204
21992205 .. include:: /includes/extracts/tls-facts-see-more.rst
22002206
2201-
22022207.. option:: --tlsDisabledProtocols <protocol(s)>
22032208
22042209 .. versionadded:: 4.2
Original file line number Diff line number Diff line change @@ -979,14 +979,20 @@ TLS Options
979979
980980 .. versionadded:: 4.2
981981
982- .. include:: /includes/TLS-SSL-certificates.rst
982+ By default, the server bypasses client certificate validation unless
983+ the server is configured to use a CA file. If a CA file is provided, the
984+ following rules apply:
983985
984- For clients that present a certificate, however, ``mongos`` performs
985- certificate validation using the root certificate chain specified by
986- ``--tlsCAFile`` and reject clients with invalid certificates.
986+ - .. include:: /includes/TLS-SSL-certificates.rst
987+
988+ - For clients that present a certificate, ``mongos`` performs
989+ certificate validation using the root certificate chain specified by
990+ :option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
991+ certificates.
987992
988- Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
989- clients that do not or cannot present certificates to the ``mongos``.
993+ Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
994+ a mixed deployment that includes clients that do not or cannot present
995+ certificates to the ``mongos``.
990996
991997 .. include:: /includes/extracts/tls-facts-see-more.rst
992998
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ Configure ``mongod`` and ``mongos`` for TLS/SSL
1313.. contents:: On this page
1414 :local:
1515 :backlinks: none
16- :depth: 1
16+ :depth: 2
1717 :class: singlecol
1818
1919Overview
@@ -80,6 +80,11 @@ members, it is advisable to use different certificates on different
8080servers. This minimizes exposure of the private key and allows for
8181hostname validation.
8282
83+ .. note::
84+
85+ If a MongoDB deployment is not configured to use a CA file, it bypasses client
86+ certificate validation.
87+
8388.. [#FIPS]
8489
8590 For FIPS mode, ensure that the certificate is FIPS-compliant (i.e
You can’t perform that action at this time.
0 commit comments