Skip to content

Commit e1f662b

Browse files
committed
DOCSP-1834: scram part2
1 parent 2f294e2 commit e1f662b

7 files changed

+10
-10
lines changed

source/core/authentication-mechanisms.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Default Authentication Mechanism
3333
.. versionchanged:: 3.0
3434

3535
As of MongoDB 3.0, :ref:`Salted Challenge Response Authentication
36-
Mechanism (SCRAM) <authentication-scram-sha-1>` is the default
36+
Mechanism (SCRAM) <authentication-scram>` is the default
3737
authentication mechanism for MongoDB.
3838

3939
Previous versions used :doc:`MONGODB-CR </core/security-mongodb-cr>` as

source/core/security-mongodb-cr.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,6 @@ identify the user.
2727

2828
MongoDB no longer defaults to ``MONGODB-CR`` and instead uses
2929
:ref:`Salted Challenge Response Authentication Mechanism (SCRAM)
30-
<authentication-scram-sha-1>` as the default authentication mechanism.
30+
<authentication-scram>` as the default authentication mechanism.
3131

3232
.. include:: /includes/fact-mongodb-cr-users.rst

source/tutorial/configure-fips.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ system. However, if your environment requires FIPS compliant encryption
6969
uses only FIPS-compliant encryption.
7070

7171
MongoDB's FIPS support covers the way that MongoDB uses OpenSSL for
72-
network encryption, ``SCRAM-SHA-1`` authentication, and x.509
72+
network encryption, SCRAM authentication, and x.509
7373
authentication. If you use Kerberos or LDAP authentication, you must
7474
ensure that these external mechanisms are FIPS-compliant.
7575
``MONGODB-CR`` authentication is **not** FIPS compliant.

source/tutorial/control-access-to-mongodb-windows-with-kerberos-authentication.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Incorporate Additional Authentication Mechanisms
9393

9494
Kerberos authentication (:ref:`GSSAPI <security-auth-kerberos>` (Kerberos))
9595
can work alongside MongoDB's challenge/response authentication mechanisms
96-
(:ref:`SCRAM-SHA-1 <authentication-scram-sha-1>` and
96+
(:ref:`SCRAM-SHA-1 <authentication-scram>` and
9797
:ref:`MONGODB-CR <authentication-mongodb-cr>`), MongoDB's
9898
authentication mechanism for LDAP (:ref:`PLAIN <security-auth-ldap>`
9999
(LDAP SASL)), and MongoDB's authentication mechanism for x.509 (

source/tutorial/control-access-to-mongodb-with-kerberos-authentication.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Incorporate Additional Authentication Mechanisms
168168

169169
Kerberos authentication (:ref:`GSSAPI <security-auth-kerberos>` (Kerberos))
170170
can work alongside MongoDB's challenge/response authentication mechanisms
171-
(:ref:`SCRAM-SHA-1 <authentication-scram-sha-1>` and
171+
(:ref:`SCRAM-SHA-1 <authentication-scram>` and
172172
:ref:`MONGODB-CR <authentication-mongodb-cr>`), MongoDB's
173173
authentication mechanism for LDAP (:ref:`PLAIN <security-auth-ldap>`
174174
(LDAP SASL)), and MongoDB's authentication mechanism for x.509 (

source/tutorial/enforce-keyfile-access-control-in-existing-replica-set-without-downtime.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ enforcing authentication.
3131
enforcing authentication in an existing MongoDB 3.2 replica set.
3232

3333
This tutorial uses the :ref:`keyfile <internal-auth-keyfile>` internal
34-
authentication mechanism for internal security, and :ref:`SCRAM-SHA-1
35-
<authentication-scram-sha-1>`-based :ref:`role-based access controls
34+
authentication mechanism for internal security, and
35+
:ref:`authentication-scram`-based :ref:`role-based access controls
3636
<authorization>` for client connections.
3737

3838
Cloud Manager and Ops Manager

source/tutorial/enforce-keyfile-access-control-in-existing-sharded-cluster-no-downtime.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ IP Binding
5757
Internal and Client Authentication Mechanisms
5858
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
5959

60-
This tutorial configures authentication using :ref:`SCRAM-SHA-1
61-
<authentication-scram-sha-1>` for client authentication and a :ref:`keyfile
62-
<internal-auth-keyfile>` for internal authentication.
60+
This tutorial configures authentication using
61+
:ref:`authentication-scram` for client authentication and a
62+
:ref:`keyfile <internal-auth-keyfile>` for internal authentication.
6363

6464
Refer to the :ref:`authentication` documentation for a complete list of
6565
available client and internal authentication mechanisms.

0 commit comments

Comments
 (0)