Skip to content

Commit 486c02a

Browse files
kallimachoskay-kim
authored andcommitted
DOCS-10984 Fix duplicate 'the'
1 parent 1dff078 commit 486c02a

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

source/core/security-ldap-external.txt

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ LDAP Authorization
2626
The LDAP Authorization process is summarized below:
2727

2828
#. A client connects to MongoDB and performs authentication with any
29-
:ref:`authentication <authentication>` mechanism that
30-
:ref:`supports external authentication
29+
:ref:`authentication <authentication>` mechanism that
30+
:ref:`supports external authentication
3131
<security-ldap-external-compatibility>`.
3232

3333
#. MongoDB binds to to the LDAP server specified with :setting:`security.ldap.servers`
@@ -38,10 +38,10 @@ The LDAP Authorization process is summarized below:
3838
instead if configured in :setting:`security.ldap.bind.method` and
3939
:setting:`security.ldap.bind.saslMechanisms`.
4040

41-
#. MongoDB constructs an LDAP query using the
41+
#. MongoDB constructs an LDAP query using the
4242
:setting:`security.ldap.authz.queryTemplate` and queries the LDAP server for
4343
the authenticated user's group membership.
44-
44+
4545
MongoDB can use the :setting:`security.ldap.userToDNMapping` option to
4646
transform the username for supporting the query template.
4747

@@ -103,7 +103,7 @@ To manage roles on the MongoDB server, authenticate as a user whose group
103103
membership corresponds to a ``admin`` database role with role administration
104104
privileges, such as those provided by :authrole:`userAdmin`. Create or update
105105
roles corresponding to LDAP group DNs such that users with membership in that
106-
group receive the appropriate roles and privileges.
106+
group receive the appropriate roles and privileges.
107107

108108
For example, an LDAP group for database administrators might have a role with
109109
administrative roles and privileges. An LDAP group for marketing or analytics
@@ -121,15 +121,15 @@ non-``$external`` user with these privileges exists, you effectively cannot
121121
perform user management, as no new or existing roles can be altered to reflect
122122
additions or changes to groups or group membership on the LDAP server.
123123

124-
To remedy a scenario where you cannot manage roles on the MongoDB server,
124+
To remedy a scenario where you cannot manage roles on the MongoDB server,
125125
perform the following procedure:
126126

127127
#. Restart the MongoDB server without authentication and LDAP authorization
128128

129129
#. Create a role on the ``admin`` database whose name corresponds to the
130130
appropriate LDAP group Distinguished Name. When choosing a group DN,
131131
consider which group is most appropriate for database administration.
132-
132+
133133
#. Restart the MongoDB server with authentication and LDAP authorization
134134

135135
#. Authenticate as a user with membership in the group corresponding to the
@@ -204,7 +204,7 @@ configuration file:
204204
template executed by MongoDB to obtain the LDAP groups to
205205
which the user belongs to. The query is relative to the host or hosts
206206
specified in :setting:`~security.ldap.servers`.
207-
207+
208208
Use the ``{USER}`` special placeholder to substitute the authenticated
209209
username, or the :setting:`transformed <security.ldap.userToDNMapping>`
210210
username, into the LDAP query.
@@ -272,7 +272,7 @@ configuration file:
272272

273273
- Depending on your :setting:`~security.ldap.queryTemplate`, the
274274
authenticated client username may require transformation to support the
275-
the LDAP query URL. :setting:`~security.ldap.userToDNMapping` allows
275+
LDAP query URL. :setting:`~security.ldap.userToDNMapping` allows
276276
MongoDB to transform incoming usernames.
277277

278278
- **NO**, unless client usernames require transformation into LDAP DNs.
@@ -288,7 +288,7 @@ authenticated user's groups. If MongoDB transformed the username using
288288
:setting:`~security.ldap.userToDNMapping`, MongoDB replaces the ``{USER}``
289289
token with the transformed username when constructing the LDAP query URL.
290290

291-
.. example::
291+
.. example::
292292

293293
The following query template returns any groups listed in the
294294
LDAP user object's ``memberOf`` attribute. This query assumes the ``memberOf``
@@ -359,19 +359,19 @@ shell must:
359359
- set :option:`--authenticationDatabase` to ``$external``.
360360

361361
- set :option:`authenticationMechanism` to the appropriate authentication
362-
mechanism.
363-
362+
mechanism.
363+
364364
If using :ref:`LDAP authentication <security-ldap>`, set this to ``PLAIN``.
365-
365+
366366
If using :ref:`Kerberos authentication <security-kerberos>`, set this to
367367
``GSSAPI``.
368-
368+
369369
If using :ref:`x.509 <security-auth-x509>`, set this to ``MONGODB-X.509``.
370370

371371
- set :option:`--username` to a username that respects the
372372
:setting:`security.ldap.authz.queryTemplate`, or any configured
373373
:setting:`security.ldap.userToDNMapping` template.
374-
374+
375375
- set :option:`--password` to the appropriate password.
376376

377377
Include the :option:`--host` and :option:`--port` of the MongoDB server,

0 commit comments

Comments
 (0)