@@ -267,11 +267,12 @@ authentication system:
267267 functionality, such as :dbcommand:`listDatabases`.
268268
269269- The following issues track ongoing improvements to the authorization
270- system:
270+ or authentication system:
271271
272272 - :issue:`SERVER-3198`
273273 - :issue:`SERVER-7122`
274274 - :issue:`SERVER-7124`
275+ - :issue:`SERVER-7115`
275276
276277- Once authenticated a "normal" user has full read and write access to
277278 a database.
@@ -284,14 +285,14 @@ authentication system:
284285 #. add the first user to the ``admin`` database when connected to
285286 the :program:`mongod` instance from a ``localhost`` connection. [#sharded-localhost]_
286287
287- .. version added :: 2.0
288+ .. versionadded :: 2.0
288289 Support for authentication with sharded clusters. Before 2.0
289290 sharded clusters *had* to run with trusted applications and a
290291 trusted networking configuration.
291292
292293Consider the
293294:doc:`/tutorial/use-authentication-to-control-access-to-mongodb`
294- document which outlines procedures for configuraing and maintaing
295+ document which outlines procedures for configuring and maintaining
295296users and access with MongoDB's authentication system.
296297
297298.. [#sharded-localhost] Becasue of :issue:`SERVER-6591`, you cannot
@@ -304,8 +305,8 @@ users and access with MongoDB's authentication system.
304305Interfaces
305306----------
306307
307- Simply limiting access to a :program:`mongod` is not a sufficent for
308- totally controling risk expsorure . Consider the recomendaitons in the
308+ Simply limiting access to a :program:`mongod` is not sufficent for
309+ totally controling risk exposure . Consider the recommendations in the
309310following section, for limiting exposure other interface-related
310311risks.
311312
@@ -338,12 +339,12 @@ a variety of operational data, logs, and status reports regarding the
338339:program:`mongod` or :program:`mongos` instance. The HTTP interface is
339340always avalible on the the port numbered ``1000`` greater than the
340341primary :program:`mongod` port. By default this is ``28017``, but is
341- indirectly using the :setting:`port` option which allows you to
342+ indirectly set using the :setting:`port` option which allows you to
342343configure the primary :program:`mongod` port.
343344
344345Without the :setting:`rest` setting, this interface is entirely
345346read-only, and limited in scope; nevertheless, this iterface may
346- represent an exposure. To diable the HTTP interface, set the
347+ represent an exposure. To disable the HTTP interface, set the
347348:setting:`nohttpinterface` run time option or the
348349:option:`--nohttpinterface <mongod --nohttpinterface>` command line
349350option.
@@ -372,7 +373,7 @@ the REST API interface:
372373Data Encryption
373374---------------
374375
375- To support audit requirements, you may need to envrypt data stored in
376+ To support audit requirements, you may need to encrypt data stored in
376377MongoDB. For best results you can encrypt this data in the application
377378layer, by encrytping the content of fields that hold secure data.
378379
0 commit comments