Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ pre: |
:setting:`security.ldap.servers`.

You must also enable LDAP authentication by setting
:setting:`security.authentication` to `enabled` and :setting:`setParameter`
:setting:`security.authorization` to `enabled` and :setting:`setParameter`
:parameter:`authenticationMechanisms` to ``PLAIN``

.. example::
Expand All @@ -56,7 +56,7 @@ pre: |
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
setParameter:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,7 @@ ref: security-kerberos-activedirectory-authauthz-configurebinding
level: 4
pre: |

In the MongoDB configuration file, set :setting:`security.authentication` to
In the MongoDB configuration file, set :setting:`security.authorization` to
`enabled` and :setting:`setParameter` :parameter:`authenticationMechanisms`
to ``GSSAPI``

Expand All @@ -242,7 +242,7 @@ pre: |
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
setParameter:
authenticationMechanisms: "GSSAPI"

Expand Down
6 changes: 3 additions & 3 deletions source/reference/program/mongoldap.txt
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ LDAP authentication and authorization via Active Directory:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
bind:
Expand All @@ -84,15 +84,15 @@ LDAP authentication and authorization via Active Directory:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "PLAIN"
authenticationMechanisms: "PLAIN"

You can use :program:`mongoldap` to validate the configuration file, which
returns a report of the procedure. You must specify a username and password
for :program:`mongoldap`.

.. code-block:: shell

mongoldap --config <path-to-config> --username "bob@dba.example.com" --password "secret123"
mongoldap --config <path-to-config> --user "bob@dba.example.com" --password "secret123"

If the provided credentials are valid, and the LDAP options in the
configuration files are valid, the output might be as follows:
Expand Down
4 changes: 2 additions & 2 deletions source/tutorial/authenticate-nativeldap-activedirectory.txt
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ This procedure produces the following configuration file:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
bind:
Expand All @@ -175,7 +175,7 @@ This procedure produces the following configuration file:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "PLAIN"
authenticationMechanisms: "PLAIN"

The given sample configuration requires modification to match your Active
Directory schema, directory structure, and configuration. You may also require
Expand Down
4 changes: 2 additions & 2 deletions source/tutorial/kerberos-auth-activedirectory-authz.txt
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ This procedure produces the following configuration file:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: activedirectory.example.net"
bind:
Expand All @@ -194,7 +194,7 @@ This procedure produces the following configuration file:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "GSSAPI"
authenticationMechanisms: "GSSAPI"

.. important::

Expand Down