@@ -52,8 +52,6 @@ stored in the key manager.
52
52
53
53
MongoDB Enterprise supports secure transfer of keys with Key Management
54
54
Interoperability Protocol (KMIP) compliant key management appliances.
55
- Any appliance vendor that provides support for KMIP is expected
56
- to be compatible.
57
55
58
56
.. include:: /includes/partners-security.rst
59
57
@@ -68,6 +66,8 @@ Prerequisites
68
66
69
67
- Your key manager must support the KMIP communication protocol.
70
68
69
+ .. include:: /includes/reference/fact-kmip-version.rst
70
+
71
71
- To authenticate MongoDB to a KMIP server, you must have a valid
72
72
certificate issued by the key management appliance.
73
73
@@ -80,34 +80,32 @@ Prerequisites
80
80
Encrypt Using a New Key
81
81
~~~~~~~~~~~~~~~~~~~~~~~
82
82
83
- To create a new key, connect :binary:`~bin.mongod` to the key manager by starting
84
- :binary:`~bin.mongod` with the following options :
83
+ To create a new key when you connect to the key manager, use the
84
+ following options to start ``mongod`` :
85
85
86
86
- :option:`--enableEncryption <mongod --enableEncryption>`
87
87
- :option:`--kmipServerName <mongod --kmipServerName>`
88
88
- :option:`--kmipPort <mongod --kmipPort>`
89
89
- :option:`--kmipServerCAFile <mongod --kmipServerCAFile>`
90
90
- :option:`--kmipClientCertificateFile <mongod --kmipClientCertificateFile>`
91
91
92
+ .. include:: /includes/reference/fact-add-v1-flag.rst
93
+
92
94
.. include:: /includes/extracts/default-bind-ip-security-additional-command-line.rst
93
95
94
- The following operation creates a new master key in your key manager which
95
- :binary:`~bin. mongod` uses to encrypt the keys :binary:`~bin. mongod` generates
96
- for each database.
96
+ The following operation creates a new master key in your key manager.
97
+ `` mongod`` uses the master key to encrypt the keys that `` mongod``
98
+ generates for each database.
97
99
98
100
.. code-block:: bash
99
101
100
- mongod --enableEncryption --kmipServerName <KMIP Server HostName> \
101
- --kmipPort <KMIP server port> --kmipServerCAFile ca.pem \
102
- --kmipClientCertificateFile client.pem
102
+ mongod --enableEncryption \
103
+ --kmipServerName <KMIP Server HostName> \
104
+ --kmipPort <KMIP server port> \
105
+ --kmipServerCAFile ca.pem \
106
+ --kmipClientCertificateFile client.pem
103
107
104
- When connecting to the KMIP server, the :binary:`~bin.mongod` verifies
105
- that the specified :option:`--kmipServerName <mongod --kmipServerName>`
106
- matches the Subject Alternative Name ``SAN`` (or, if ``SAN`` is not
107
- present, the Common Name ``CN``) in the certificate presented by the
108
- KMIP server. [#san]_ If ``SAN`` is present, :binary:`~bin.mongod` does
109
- not match against the ``CN``. If the hostname does not match the
110
- ``SAN`` (or ``CN``), the :binary:`~bin.mongod` will fail to connect.
108
+ .. include:: /includes/reference/fact-connection-check.rst
111
109
112
110
To verify that the key creation and usage was successful, check the log
113
111
file. If successful, the process will log the following messages:
@@ -126,9 +124,9 @@ file. If successful, the process will log the following messages:
126
124
Encrypt Using an Existing Key
127
125
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
128
126
129
- You can use an existing master key your KMIP server created and
130
- manages. To use an existing key, connect :binary:`~bin.mongod` to the
131
- key manager by starting :binary:`~bin. mongod` with the following options :
127
+ You can use an existing master key that your KMIP server already
128
+ manages. To use an existing key, use these options when you start
129
+ ``mongod`` to connect `` mongod`` to the key manager :
132
130
133
131
- :option:`--enableEncryption <mongod --enableEncryption>`
134
132
- :option:`--kmipServerName <mongod --kmipServerName>`
@@ -137,31 +135,25 @@ key manager by starting :binary:`~bin.mongod` with the following options:
137
135
- :option:`--kmipClientCertificateFile <mongod --kmipClientCertificateFile>`
138
136
- :option:`--kmipKeyIdentifier <mongod --kmipKeyIdentifier>`
139
137
140
- .. include:: /includes/extracts/default-bind-ip-security-additional-command-line .rst
138
+ .. include:: /includes/reference/fact-add-v1-flag .rst
141
139
140
+ .. include:: /includes/extracts/default-bind-ip-security-additional-command-line.rst
142
141
143
142
.. code-block:: bash
144
143
145
- mongod --enableEncryption --kmipServerName <KMIP Server HostName> \
146
- --kmipPort <KMIP server port> --kmipServerCAFile ca.pem \
147
- --kmipClientCertificateFile client.pem --kmipKeyIdentifier <UID>
144
+ mongod --enableEncryption \
145
+ --kmipServerName <KMIP Server HostName> \
146
+ --kmipPort <KMIP server port> \
147
+ --kmipServerCAFile ca.pem \
148
+ --kmipClientCertificateFile client.pem \
149
+ --kmipKeyIdentifier <UID>
148
150
149
- When connecting to the KMIP server, the :binary:`~bin.mongod` verifies
150
- that the specified :option:`--kmipServerName <mongod --kmipServerName>`
151
- matches the Subject Alternative Name ``SAN`` (or, if ``SAN`` is not
152
- present, the Common Name ``CN``) in the certificate presented by the
153
- KMIP server. [#san]_ If ``SAN`` is present, :binary:`~bin.mongod` does not
154
- match against the ``CN``. If the hostname does not match the ``SAN``
155
- (or ``CN``), the :binary:`~bin.mongod` will fail to connect.
151
+ .. include:: /includes/reference/fact-connection-check.rst
156
152
157
153
.. seealso::
158
154
159
155
:ref:`encryption-key-management-options`
160
156
161
- .. [#san]
162
-
163
- .. include:: /includes/extracts/4.2-changes-SAN-matching.rst
164
-
165
157
.. _encrypt-local-key-mgmt:
166
158
167
159
Local Key Management
0 commit comments