当前位置:网站首页>The most complete security certification of mongodb in history
The most complete security certification of mongodb in history
2022-07-07 04:04:00 【janyxe】
MongoDB List of articles
- In the history of the most complete MongoDB First knowledge of
- In the history of the most complete MongoDB Deployment of
- In the history of the most complete MongoDB And Mongo Shell Use
- In the history of the most complete MongoDB Safety certification
If this article is helpful to your development path , Please give me a compliment , Your support is my motivation to stick to blogging
Scan the QR code at the bottom of the article to get the e-book and the latest interview materials
Preface
This series of courses will take you in the form of face-to-face test questions Go deep into distributed topics MongoDB. This article takes you in depth MongoDB Safety certification
MongoDB Introduction to user permissions of
- MongoDB 2.4 Support RABC Model , Using role-based access control (Role-Based Access Control,RBAC) To manage user access to instances
RBAC( Role-based access control ): English name Role-Based Access Control
MongoDB role
| role | Permission to name |
|---|---|
| Database user role | read、readWrite |
| Database management role | dbAdmin、dbOwner、userAdmin |
| The role of cluster management | clusterAdmin、clusterManager、clusterMonitor、hostManager |
| Backup recovery role | backup、restore |
| All database roles | readAnyDatabase、readWriteAnyDatabase、userAdminAnyDatabase、dbAdminAnyDatabase |
| Super user role | root |
| Internal roles | __system |
MongoDB jurisdiction
| Authority Name | describe |
|---|---|
| read | Allows the user to read the specified database |
| readWrite | Allows users to read and write to a specified database |
| dbAdmin | Allows the user to execute administrative functions in the specified database , Like index creation 、 Delete , View statistics or access system.profile |
| dbOwner | Allows users to perform arbitrary operations in the specified database , increase 、 Delete 、 Change 、 Check etc |
| userAdmin | Allow the user to system.users A collection of written , Can be created in the specified database 、 Delete Divide and manage users |
| clusterAdmin | Only in admin Available in the database , Gives the user administrative rights to all sharding and copy-set related functions |
| readAnyDatabase | Only in admin Available in the database , Give the user read rights to all databases |
| readWriteAnyDatabase | Only in admin Available in the database , Gives the user read and write access to all databases |
| userAdminAnyDatabase | Only in admin Available in the database , That gives the user all the databases userAdmin jurisdiction |
| dbAdminAnyDatabase | Only in admin Available in the database , That gives the user all the databases dbAdmin jurisdiction |
| root | Only in admin Available in the database . Super account , Super authority |
MongoDB Suggestions for user permissions
- By default ,MongoDB The server does not start the user
Access right, Client connection MongoDB The server does not need security authentication , It can be operated at will, which has great risks - Production environment Turn on Safety Certification , Start from the command line and add
--auth, Or profile (mongod.conf) addauth=true - It is recommended to modify the default port in the production environment (27017)
- MongoDB It should be deployed in the Intranet environment ,bind_ip Parameters ( The default is localhost), According to client ip modify , Format :
bind_ip=1.1.1.1,2.2.2.2, prohibitbind_ipUse0.0.0.0orbind_ip_allSet totrue - The client operates the database , Should use the dbOwner( Database management role ) Account operation of , The administrator role is prohibited (/ Account with high permission ) Operating the database
Operate user role commands
show roles View the role list command
Concept
View role list
Command application
> show roles
{
"role" : "dbAdmin",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}
{
"role" : "dbOwner",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}
{
"role" : "enableSharding",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}
{
"role" : "read",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}
{
"role" : "readWrite",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}
{
"role" : "userAdmin",
"db" : "test",
"isBuiltin" : true,
"roles" : [ ],
"inheritedRoles" : [ ]
}

db.createUser( User information ) Create user command
Concept
Create user
Command format
db.createUser({user:“ user name ”,pwd:“ name ”,roles:[“ role ”]})
| Command parameter | meaning |
|---|---|
| user | User name |
| pwd | password |
| roles | Character list |
Command application
establish test library , And designate test The administrator of the library
> use test
switched to db test
> db.createUser({
user:"test",pwd:"test",roles:['dbOwner']})
uncaught exception: ReferenceError: dn is not defined :
@(shell):1:1
> use test
switched to db test
> db.createUser({
user:"test",pwd:"test",roles:['dbOwner']})
Successfully added user: {
"user" : "test", "roles" : [ "dbOwner" ] }
> show users
{
"_id" : "test.test",
"userId" : UUID("d9be5de9-8c28-4b2b-8d88-530be7846b14"),
"user" : "test",
"db" : "test",
"roles" : [
{
"role" : "dbOwner",
"db" : "test"
}
],
"mechanisms" : [
"SCRAM-SHA-1",
"SCRAM-SHA-256"
]
}
>

db.dropUser( User name ) Delete user command
Concept
Create user
Command format
db.dropUser(“ user name ”)
Command application
db.dropUser(“test”)
> use test
switched to db test
> dn.createUser({
user:"test",pwd:"test",roles:['dbOwner']})
uncaught exception: ReferenceError: dn is not defined :
@(shell):1:1
> use test
switched to db test
> db.createUser({
user:"test",pwd:"test",roles:['dbOwner']})
Successfully added user: {
"user" : "test", "roles" : [ "dbOwner" ] }
> show users
{
"_id" : "test.test",
"userId" : UUID("d9be5de9-8c28-4b2b-8d88-530be7846b14"),
"user" : "test",
"db" : "test",
"roles" : [
{
"role" : "dbOwner",
"db" : "test"
}
],
"mechanisms" : [
"SCRAM-SHA-1",
"SCRAM-SHA-256"
]
}
>

db.grantRolesToUser( User name ,[]) Authorize user rights command
Concept
Authorize user rights
Command format
db.grantRolesToUser(“ user name ”, [{
role: “ role code”,
db: “ Database name ”
},…
])
Command application
db.grantRolesToUser(“test”, [{
role: “dbAdmin”,
db: “test”
}
])
> use test
switched to db test
> db.createUser({
user:"test",pwd:"test",roles:['dbOwner']})
Successfully added user: {
"user" : "test", "roles" : [ "dbOwner" ] }
> db.grantRolesToUser("test", [{
... role: "dbAdmin",
... db: "test"
... }
... ])
>

Authorized account login command
Concept
Authorized account login
Command format
mongo MONGO_HOST:PORT -u USER -p PWD --authenticationDatabase=DB
| Command parameter | meaning |
|---|---|
| MONGO_HOST | Mongo Server side ip |
| PORT | Mongo Server side port |
| -u | user name |
| -p | password |
| –authenticationDatabase | Authorization database |
Command application
mongo 127.0.0.1:27017 -u test -p test --authenticationDatabase=test
[[email protected] mongodb]# mongo 127.0.0.1:27017 -u test -p test --authenticationDatabase=test
MongoDB shell version v4.4.14
connecting to: mongodb://127.0.0.1:27017/test?authSource=test&compressors=disabled&gssapiServiceName=mongodb
Implicit session: session {
"id" : UUID("bf4865d7-def1-4824-8240-d8687d820a2e") }
MongoDB server version: 4.4.14
---
The server generated these startup warnings when booting:
2022-06-29T02:07:49.470-07:00: Access control is not enabled for the database. Read and write access to data and configuration is unrestricted
2022-06-29T02:07:49.471-07:00: You are running this process as the root user, which is not recommended
2022-06-29T02:07:49.471-07:00: /sys/kernel/mm/transparent_hugepage/enabled is 'always'. We suggest setting it to 'never'
2022-06-29T02:07:49.471-07:00: /sys/kernel/mm/transparent_hugepage/defrag is 'always'. We suggest setting it to 'never'
2022-06-29T02:07:49.471-07:00: Soft rlimits too low
2022-06-29T02:07:49.471-07:00: currentValue: 1024
2022-06-29T02:07:49.471-07:00: recommendedMinimum: 64000
---
---
Enable MongoDB's free cloud-based monitoring service, which will then receive and display
metrics about your deployment (disk utilization, CPU, operation statistics, etc).
The monitoring data will be available on a MongoDB website with a unique URL accessible to you
and anyone you share the URL with. MongoDB may use this information to make product
improvements and to suggest MongoDB products and deployment options to you.
To enable free monitoring, run the following command: db.enableFreeMonitoring()
To permanently disable this reminder, run the following command: db.disableFreeMonitoring()
---
> show dbs;
admin 0.000GB
config 0.000GB
local 0.000GB
>

to see somebody for the first time , I don't know what to give you . Simply send hundreds of e-books and the latest interview materials , I wish you a better job , Scan the QR code below to get
边栏推荐
- Native MySQL
- ABAP dynamic inner table grouping cycle
- Mysql-数据丢失,分析binlog日志文件
- map和set的实现
- Some common software related
- 2022中青杯数学建模B题开放三孩背景下的生育政策研究思路
- [development software] tilipa Developer Software
- 1.19.11.SQL客户端、启动SQL客户端、执行SQL查询、环境配置文件、重启策略、自定义函数(User-defined Functions)、构造函数参数
- [dpdk] dpdk sample source code analysis III: dpdk-l3fwd_ 001
- 10 ways of interface data security assurance
猜你喜欢

Simple implementation of AVL tree insertion and verification operations

2022中青杯C题城市交通思路分析

Construction of Hisilicon universal platform: color space conversion YUV2RGB

SQL injection -day15

自适应非欧表征广告检索系统AMCAD
Implementation steps of docker deploying mysql8

【安全攻防】序列化与反序列,你了解多少?

史上最全MongoDB之部署篇

codeforces每日5题(均1700)-第七天

【开发软件】 tilipa开发者软件
随机推荐
Mysql-数据丢失,分析binlog日志文件
Do you choose pandas or SQL for the top 1 of data analysis in your mind?
复杂因子计算优化案例:深度不平衡、买卖压力指标、波动率计算
Quick completion guide of manipulator (10): accessible workspace
[leetcode] 700 and 701 (search and insert of binary search tree)
PHP implements lottery according to probability
Antd Comment 递归循环评论
2022年电工杯B 题 5G 网络环境下应急物资配送问题思路分析
. Net interface can be implemented by default
map和set的实现
Free PHP online decryption tool source code v1.2
Top 50 hit industry in the first half of 2022
史上最全MongoDB之初识篇
手机号国际区号JSON格式另附PHP获取
UltraEdit-32 温馨提示:右协会,取消 bak文件[通俗易懂]
It's too convenient. You can complete the code release and approval by nailing it!
Operational amplifier application summary 1
opencv第三方库
[MySQL] row sorting in MySQL
QT opens a file and uses QFileDialog to obtain the file name, content, etc