Skip to content

Commit c6851b0

Browse files
jocelyn-mendez1Jocelyn Mendez
andauthored
DOCSP-14356 KMIP config parameters (#742)
* DOCSP-14356 adding new config parameters * DOCSP-14356 adding new config parameters * DOCSP-14356 adding new config parameters * DOCSP-14356 definition corrections * DOCSP-14356 definition rework * DOCSP-14356 definition rework * DOCSP-20679 authentication methods * DOCSP-14356 test * DOCSP-14356 correction masterKey option * DOCSP-14356 rewording definition * DOCSP-14356 nit changes Co-authored-by: Jocelyn Mendez <[email protected]>
1 parent e8b81e9 commit c6851b0

File tree

4 files changed

+86
-2
lines changed

4 files changed

+86
-2
lines changed

source/reference/configuration-file-settings-command-line-options-mapping.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,6 +264,12 @@ and :binary:`~bin.mongos` command-line options.
264264
* - :setting:`security.kmip.serverName`
265265
- | :option:`mongod --kmipServerName`
266266

267+
* - :setting:`security.kmip.activateKeys`
268+
- | :option:`mongod --kmipActivateKeys`
269+
270+
* - :setting:`security.kmip.keyStatePollingSeconds`
271+
- | :option:`mongod --kmipKeyStatePollingSeconds`
272+
267273
* - :setting:`security.ldap.authz.queryTemplate`
268274
- | :option:`mongod --ldapAuthzQueryTemplate`
269275

source/reference/configuration-options.txt

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2766,6 +2766,8 @@ Key Management Configuration Options
27662766
serverCAFile: <string>
27672767
connectRetries: <int>
27682768
connectTimeoutMS: <int>
2769+
activateKeys: <boolean>
2770+
keyStatePollingSeconds: <int>
27692771

27702772
.. setting:: security.enableEncryption
27712773

@@ -3052,6 +3054,41 @@ Key Management Configuration Options
30523054
.. include:: /includes/fact-enterprise-only-admonition.rst
30533055

30543056

3057+
.. setting:: security.kmip.activateKeys
3058+
3059+
*Type*: boolean
3060+
3061+
*Default*: true
3062+
3063+
3064+
.. versionadded:: 5.3
3065+
3066+
Activates all newly created KMIP keys upon creation and then periodically
3067+
checks those keys are in an active state.
3068+
3069+
When ``security.kmip.activateKeys`` is ``true`` and you have existing keys
3070+
on a KMIP server, the key must be activated first or the :binary:`mongod`
3071+
node will fail to start.
3072+
3073+
If the key being used by the mongod transitions into a non-active state,
3074+
the :binary:`mongod` node will shut down unless ``kmipActivateKeys`` is
3075+
false. To ensure you have an active key, rotate the KMIP master key by
3076+
using :setting:`security.kmip.rotateMasterKey`.
3077+
3078+
3079+
.. setting:: security.kmip.keyStatePollingSeconds
3080+
3081+
*Type*: int
3082+
3083+
*Default*: 900 seconds
3084+
3085+
.. versionadded:: 5.3
3086+
3087+
Frequency in seconds at which mongod polls the KMIP server for active keys.
3088+
3089+
To disable disable polling, set the value to ``-1``.
3090+
3091+
30553092
.. _security.sasl.options:
30563093

30573094
``security.sasl`` Options

source/reference/program/mongod.txt

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3431,9 +3431,36 @@ Encryption Key Management Options
34313431

34323432
Starting in 4.0, on macOS or Windows, you can use a certificate
34333433
from the operating system's secure store instead of a PEM key
3434-
file. See :option:`--kmipClientCertificateSelector`. When using the secure store, you do not
3435-
need to, but can, also specify the :option:`--kmipServerCAFile`.
3434+
file. See :option:`--kmipClientCertificateSelector`. When using the secure
3435+
store, you do not need to, but can, also specify the :option:`--kmipServerCAFile`.
34363436

3437+
.. option:: --kmipActivateKeys <boolean>
3438+
3439+
*Default*: true
3440+
3441+
.. versionadded:: 5.3
3442+
3443+
Activates all newly created KMIP keys upon creation and then periodically
3444+
checks those keys are in an active state.
3445+
3446+
When ``--kmipActivateKeys`` is ``true`` and you have existing keys on a
3447+
KMIP server, the key must be activated first or the :binary:`mongod` node
3448+
will fail to start.
3449+
3450+
If the key being used by the mongod transitions into a non-active state,
3451+
the :binary:`mongod` node will shut down unless ``kmipActivateKeys`` is
3452+
false. To ensure you have an active key, rotate the KMIP master key by
3453+
using :option:`--kmipRotateMasterKey`.
3454+
3455+
.. option:: --kmipKeyStatePollingSeconds <integer>
3456+
3457+
*Default*: 900 seconds
3458+
3459+
.. versionadded:: 5.3
3460+
3461+
Frequency in seconds at which mongod polls the KMIP server for active keys.
3462+
3463+
To disable disable polling, set the value to ``-1``.
34373464

34383465
.. option:: --eseDatabaseKeyRollover
34393466

source/release-notes/5.3.txt

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,20 @@ Management Interoperability Protocol (KMIP) server to securely manage
9393
the keys for :ref:`encrypting the MongoDB audit log
9494
<security-encryption-at-rest-audit-log>`.
9595

96+
KMIP Key Activation
97+
~~~~~~~~~~~~~~~~~~~
98+
99+
Starting in MongoDB 5.3, :setting:`security.kmip.activateKeys` activates all
100+
newly created KMIP keys upon creation and then periodically checks that
101+
keys are in an active state.
102+
103+
Polling for Active State Keys
104+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
105+
106+
Starting in MongoDB 5.3, :setting:`security.kmip.keyStatePollingSeconds` sets
107+
the polling interval in seconds at which :binary:`mongod` polls the KMIP server
108+
for active keys.
109+
96110
.. _5.3-rel-notes-sharding:
97111

98112
Sharding

0 commit comments

Comments
 (0)