Skip to content

DOCS-9419: Fixes to mongoldap, ldap tutorials #2793

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ pre: |
:setting:`security.ldap.servers`.

You must also enable LDAP authentication by setting
:setting:`security.authentication` to `enabled` and :setting:`setParameter`
:setting:`security.authorization` to `enabled` and :setting:`setParameter`
:parameter:`authenticationMechanisms` to ``PLAIN``

.. example::
Expand All @@ -56,7 +56,7 @@ pre: |
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
setParameter:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,7 @@ ref: security-kerberos-activedirectory-authauthz-configurebinding
level: 4
pre: |

In the MongoDB configuration file, set :setting:`security.authentication` to
In the MongoDB configuration file, set :setting:`security.authorization` to
`enabled` and :setting:`setParameter` :parameter:`authenticationMechanisms`
to ``GSSAPI``

Expand All @@ -242,7 +242,7 @@ pre: |
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
setParameter:
authenticationMechanisms: "GSSAPI"

Expand Down
6 changes: 3 additions & 3 deletions source/reference/program/mongoldap.txt
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ LDAP authentication and authorization via Active Directory:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
bind:
Expand All @@ -84,15 +84,15 @@ LDAP authentication and authorization via Active Directory:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "PLAIN"
authenticationMechanisms: "PLAIN"

You can use :program:`mongoldap` to validate the configuration file, which
returns a report of the procedure. You must specify a username and password
for :program:`mongoldap`.

.. code-block:: shell

mongoldap --config <path-to-config> --username "[email protected]" --password "secret123"
mongoldap --config <path-to-config> --user "[email protected]" --password "secret123"

If the provided credentials are valid, and the LDAP options in the
configuration files are valid, the output might be as follows:
Expand Down
4 changes: 2 additions & 2 deletions source/tutorial/authenticate-nativeldap-activedirectory.txt
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ This procedure produces the following configuration file:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: "activedirectory.example.net"
bind:
Expand All @@ -175,7 +175,7 @@ This procedure produces the following configuration file:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "PLAIN"
authenticationMechanisms: "PLAIN"

The given sample configuration requires modification to match your Active
Directory schema, directory structure, and configuration. You may also require
Expand Down
4 changes: 2 additions & 2 deletions source/tutorial/kerberos-auth-activedirectory-authz.txt
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ This procedure produces the following configuration file:
.. code-block:: yaml

security:
authentication: "enabled"
authorization: "enabled"
ldap:
servers: activedirectory.example.net"
bind:
Expand All @@ -194,7 +194,7 @@ This procedure produces the following configuration file:
authz:
queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))"
setParameter:
authenticationMechanism: "GSSAPI"
authenticationMechanisms: "GSSAPI"

.. important::

Expand Down