@@ -273,6 +273,10 @@ authentication system:
273
273
- :issue:`SERVER-7122`
274
274
- :issue:`SERVER-7124`
275
275
276
+ and authentication:
277
+
278
+ - :issue:`SERVER-7115`
279
+
276
280
- Once authenticated a "normal" user has full read and write access to
277
281
a database.
278
282
@@ -291,7 +295,7 @@ authentication system:
291
295
292
296
Consider the
293
297
:doc:`/tutorial/use-authentication-to-control-access-to-mongodb`
294
- document which outlines procedures for configuraing and maintaing
298
+ document which outlines procedures for configuring and maintaining
295
299
users and access with MongoDB's authentication system.
296
300
297
301
.. [#sharded-localhost] Becasue of :issue:`SERVER-6591`, you cannot
@@ -304,8 +308,8 @@ users and access with MongoDB's authentication system.
304
308
Interfaces
305
309
----------
306
310
307
- Simply limiting access to a :program:`mongod` is not a sufficent for
308
- totally controling risk expsorure . Consider the recomendaitons in the
311
+ Simply limiting access to a :program:`mongod` is not sufficent for
312
+ totally controling risk exposure . Consider the recommendations in the
309
313
following section, for limiting exposure other interface-related
310
314
risks.
311
315
@@ -338,12 +342,12 @@ a variety of operational data, logs, and status reports regarding the
338
342
:program:`mongod` or :program:`mongos` instance. The HTTP interface is
339
343
always avalible on the the port numbered ``1000`` greater than the
340
344
primary :program:`mongod` port. By default this is ``28017``, but is
341
- indirectly using the :setting:`port` option which allows you to
345
+ indirectly set using the :setting:`port` option which allows you to
342
346
configure the primary :program:`mongod` port.
343
347
344
348
Without the :setting:`rest` setting, this interface is entirely
345
349
read-only, and limited in scope; nevertheless, this iterface may
346
- represent an exposure. To diable the HTTP interface, set the
350
+ represent an exposure. To disable the HTTP interface, set the
347
351
:setting:`nohttpinterface` run time option or the
348
352
:option:`--nohttpinterface <mongod --nohttpinterface>` command line
349
353
option.
@@ -372,7 +376,7 @@ the REST API interface:
372
376
Data Encryption
373
377
---------------
374
378
375
- To support audit requirements, you may need to envrypt data stored in
379
+ To support audit requirements, you may need to encrypt data stored in
376
380
MongoDB. For best results you can encrypt this data in the application
377
381
layer, by encrytping the content of fields that hold secure data.
378
382
0 commit comments