Skip to content

Commit d07a309

Browse files
Backport of DOCSP-4767 (#5382)
* Update source/tutorial/configure-ssl.txt Co-authored-by: ianf-mongodb <[email protected]> * Merge branch 'DOCSP-4767-to_7.1' into DOCSP-4767-latest --------- Co-authored-by: ianf-mongodb <[email protected]>
1 parent 49f9921 commit d07a309

File tree

4 files changed

+42
-21
lines changed

4 files changed

+42
-21
lines changed

source/reference/configuration-options.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1445,18 +1445,23 @@ Core Options
14451445

14461446
.. versionadded:: 4.2
14471447

1448-
.. include:: /includes/TLS-SSL-certificates.rst
1448+
By default, the server bypasses client certificate validation unless
1449+
the server is configured to use a CA file. If a CA file is provided, the
1450+
following rules apply:
1451+
1452+
- .. include:: /includes/TLS-SSL-certificates.rst
14491453

1450-
For clients that present a certificate, however, :binary:`~bin.mongos` or :binary:`~bin.mongod` performs
1451-
certificate validation using the root certificate chain specified by
1452-
:setting:`~net.tls.CAFile` and reject clients with invalid certificates.
1454+
- For clients that present a certificate, :binary:`~bin.mongos` or
1455+
:binary:`~bin.mongod` performs certificate validation using the root
1456+
certificate chain specified by :setting:`~net.tls.CAFile` and reject
1457+
clients with invalid certificates.
14531458

1454-
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
1455-
clients that do not or cannot present certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
1459+
Use the :setting:`net.tls.allowConnectionsWithoutCertificates` option if you
1460+
have a mixed deployment that includes clients that do not or cannot present
1461+
certificates to the :binary:`~bin.mongos` or :binary:`~bin.mongod`.
14561462

14571463
.. include:: /includes/extracts/tls-facts-see-more.rst
14581464

1459-
14601465
.. setting:: net.tls.allowInvalidCertificates
14611466

14621467
*Type*: boolean

source/reference/program/mongod.txt

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2235,18 +2235,23 @@ TLS Options
22352235

22362236
.. versionadded:: 4.2
22372237

2238-
.. include:: /includes/TLS-SSL-certificates.rst
2238+
By default, the server bypasses client certificate validation unless
2239+
the server is configured to use a CA file. If a CA file is provided, the
2240+
following rules apply:
22392241

2240-
For clients that present a certificate, however, ``mongod`` performs
2241-
certificate validation using the root certificate chain specified by
2242-
``--tlsCAFile`` and reject clients with invalid certificates.
2242+
- .. include:: /includes/TLS-SSL-certificates.rst
2243+
2244+
- For clients that present a certificate, ``mongod`` performs
2245+
certificate validation using the root certificate chain specified by
2246+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
2247+
certificates.
22432248

2244-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
2245-
clients that do not or cannot present certificates to the ``mongod``.
2249+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
2250+
a mixed deployment that includes clients that do not or cannot present
2251+
certificates to the ``mongod``.
22462252

22472253
.. include:: /includes/extracts/tls-facts-see-more.rst
22482254

2249-
22502255
.. option:: --tlsDisabledProtocols <protocol(s)>
22512256

22522257
.. versionadded:: 4.2

source/reference/program/mongos.txt

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1010,14 +1010,20 @@ TLS Options
10101010

10111011
.. versionadded:: 4.2
10121012

1013-
.. include:: /includes/TLS-SSL-certificates.rst
1013+
By default, the server bypasses client certificate validation unless
1014+
the server is configured to use a CA file. If a CA file is provided, the
1015+
following rules apply:
10141016

1015-
For clients that present a certificate, however, ``mongos`` performs
1016-
certificate validation using the root certificate chain specified by
1017-
``--tlsCAFile`` and reject clients with invalid certificates.
1017+
- .. include:: /includes/TLS-SSL-certificates.rst
1018+
1019+
- For clients that present a certificate, ``mongos`` performs
1020+
certificate validation using the root certificate chain specified by
1021+
:option:`--tlsCAFile <mongod --tlsCAFile>` and reject clients with invalid
1022+
certificates.
10181023

1019-
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have a mixed deployment that includes
1020-
clients that do not or cannot present certificates to the ``mongos``.
1024+
Use the :option:`--tlsAllowConnectionsWithoutCertificates` option if you have
1025+
a mixed deployment that includes clients that do not or cannot present
1026+
certificates to the ``mongos``.
10211027

10221028
.. include:: /includes/extracts/tls-facts-see-more.rst
10231029

source/tutorial/configure-ssl.txt

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Configure ``mongod`` and ``mongos`` for TLS/SSL
99
.. contents:: On this page
1010
:local:
1111
:backlinks: none
12-
:depth: 1
12+
:depth: 2
1313
:class: singlecol
1414

1515
Overview
@@ -71,6 +71,11 @@ members, it is advisable to use different certificates on different
7171
servers. This minimizes exposure of the private key and allows for
7272
hostname validation.
7373

74+
.. note::
75+
76+
If a MongoDB deployment is not configured to use a CA file, it bypasses client
77+
certificate validation.
78+
7479
.. [#FIPS]
7580

7681
For FIPS mode, ensure that the certificate is FIPS-compliant (i.e

0 commit comments

Comments
 (0)