@@ -130,8 +130,7 @@ content: |
130
130
131
131
.. important::
132
132
133
- Starting with MongoDB 3.4, you can
134
- authenticate users using LDAP, Kerberos, or X.509 certificates
133
+ You can authenticate users using LDAP, Kerberos, or X.509 certificates
135
134
without requiring local user documents in the ``$external``
136
135
database as long as you enable LDAP authorization first. When such a user successfully
137
136
authenticates, MongoDB performs a query against the LDAP server to
@@ -193,6 +192,20 @@ content: |
193
192
- Specify the password with which MongoDB binds when connecting to an
194
193
LDAP server.
195
194
195
+ * - New Query Password (LDAP Bind DN)
196
+
197
+ - (Optional). Use this field if you want to rotate the LDAP password.
198
+ Specify the new password with which MongoDB will bind when
199
+ connecting to an LDAP server. Specifying a new password in
200
+ this field allows you to smoothly rotate the query password.
201
+
202
+ .. important::
203
+
204
+ After you rotate the password on the LDAP server side,
205
+ move the contents of the :guilabel:`New Query Password`
206
+ field into the :guilabel:`Query Password` field and make
207
+ the :guilabel:`New Query Password` field empty.
208
+
196
209
* - LDAP User Cache Invalidation Interval (s)
197
210
198
211
- Specify how long MongoDB waits to flush the LDAP user cache.
@@ -250,13 +263,12 @@ content: |
250
263
251
264
.. important::
252
265
253
- Starting with MongoDB 3.4, you can
254
- authenticate users using LDAP, Kerberos, and X.509 certificates
255
- without requiring local user documents in the ``$external``
256
- database as long as you enable LDAP authorization first. When such a user successfully
257
- authenticates, MongoDB performs a query against the LDAP server to
258
- retrieve all groups which that LDAP user possesses and transforms those
259
- groups into their equivalent MongoDB roles.
266
+ You can authenticate users using LDAP, Kerberos, and X.509 certificates
267
+ without requiring local user documents in the ``$external``
268
+ database as long as you enable LDAP authorization first. When such a user
269
+ successfully authenticates, MongoDB performs a query against the LDAP
270
+ server to retrieve all groups which that LDAP user possesses and transforms
271
+ those groups into their equivalent MongoDB roles.
260
272
261
273
Skip this step if you don't want to enable LDAP authorization.
262
274
@@ -285,4 +297,15 @@ ref: set-authorization-settings-no-ldap
285
297
title : " Click :guilabel:`Save Settings`."
286
298
level : 4
287
299
ref : save-auth-settings
300
+ content : |
301
+
302
+ .. note::
303
+
304
+ While you save the settings with a new password, MongoDB tries
305
+ both passwords. After completing this procedure, you can change
306
+ the password in your LDAP server. After you rotate the password
307
+ on the LDAP server side, move the contents of the
308
+ :guilabel:`New Query Password` field into the :guilabel:`Query Password`
309
+ field and make the :guilabel:`New Query Password` field empty.
310
+
288
311
...
0 commit comments