Skip to content

Commit 08edfac

Browse files
authored
(DOCSP-45035) Rotate LDAP pwd for Agent in OM (#675)
This PR is equivalent in its contents to the [PR on the Cloud Manager side](10gen/docs-cloud-manager#150). Note: These doc sources are now split and hence we have this separate PR, as opposed to having a single PR for OM/CM docs that were previously built from one source. The only difference is that I reused the same steps file for both enabling LDAP and rotating the pwd. This is because OM uses yaml file includes and it was easier to do it this way for this long-maintained doc repo. The rest of the approach is the same as for the CM PR. @pstefek-mongo and @kyuan-mongodb could you please review? - [DOCSP-45035](https://jira.mongodb.org/browse/DOCSP-45035) - [STAGING](https://deploy-preview-675--docs-ops-manager.netlify.app/tutorial/enable-ldap-authentication-for-group/)
1 parent 8e3d97a commit 08edfac

File tree

4 files changed

+56
-31
lines changed

4 files changed

+56
-31
lines changed

source/includes/note-reset-auth.rst

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,4 @@
11
.. note::
22

3-
If you want to
4-
:doc:`reset Authentication and TLS settings </tutorial/clear-security-settings>`
5-
for your project, first
6-
:doc:`unmanage any MongoDB deployments </tutorial/unmanage-deployment>`
7-
that |mms| manages in your project.
3+
To :ref:`reset Authentication and TLS settings <clear-security-settings>`
4+
for your project, first :ref:`unmanage any MongoDB deployments <unmanage-deployment>` that |mms| manages in your project.

source/includes/steps-source-enable-authentication.yaml

Lines changed: 32 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -130,8 +130,7 @@ content: |
130130
131131
.. important::
132132
133-
Starting with MongoDB 3.4, you can
134-
authenticate users using LDAP, Kerberos, or X.509 certificates
133+
You can authenticate users using LDAP, Kerberos, or X.509 certificates
135134
without requiring local user documents in the ``$external``
136135
database as long as you enable LDAP authorization first. When such a user successfully
137136
authenticates, MongoDB performs a query against the LDAP server to
@@ -193,6 +192,20 @@ content: |
193192
- Specify the password with which MongoDB binds when connecting to an
194193
LDAP server.
195194
195+
* - New Query Password (LDAP Bind DN)
196+
197+
- (Optional). Use this field if you want to rotate the LDAP password.
198+
Specify the new password with which MongoDB will bind when
199+
connecting to an LDAP server. Specifying a new password in
200+
this field allows you to smoothly rotate the query password.
201+
202+
.. important::
203+
204+
After you rotate the password on the LDAP server side,
205+
move the contents of the :guilabel:`New Query Password`
206+
field into the :guilabel:`Query Password` field and make
207+
the :guilabel:`New Query Password` field empty.
208+
196209
* - LDAP User Cache Invalidation Interval (s)
197210
198211
- Specify how long MongoDB waits to flush the LDAP user cache.
@@ -250,13 +263,12 @@ content: |
250263
251264
.. important::
252265
253-
Starting with MongoDB 3.4, you can
254-
authenticate users using LDAP, Kerberos, and X.509 certificates
255-
without requiring local user documents in the ``$external``
256-
database as long as you enable LDAP authorization first. When such a user successfully
257-
authenticates, MongoDB performs a query against the LDAP server to
258-
retrieve all groups which that LDAP user possesses and transforms those
259-
groups into their equivalent MongoDB roles.
266+
You can authenticate users using LDAP, Kerberos, and X.509 certificates
267+
without requiring local user documents in the ``$external``
268+
database as long as you enable LDAP authorization first. When such a user
269+
successfully authenticates, MongoDB performs a query against the LDAP
270+
server to retrieve all groups which that LDAP user possesses and transforms
271+
those groups into their equivalent MongoDB roles.
260272
261273
Skip this step if you don't want to enable LDAP authorization.
262274
@@ -285,4 +297,15 @@ ref: set-authorization-settings-no-ldap
285297
title: "Click :guilabel:`Save Settings`."
286298
level: 4
287299
ref: save-auth-settings
300+
content: |
301+
302+
.. note::
303+
304+
While you save the settings with a new password, MongoDB tries
305+
both passwords. After completing this procedure, you can change
306+
the password in your LDAP server. After you rotate the password
307+
on the LDAP server side, move the contents of the
308+
:guilabel:`New Query Password` field into the :guilabel:`Query Password`
309+
field and make the :guilabel:`New Query Password` field empty.
310+
288311
...

source/tutorial/clear-security-settings.txt

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
.. _clear-security-settings:
2+
13
=======================
24
Clear Security Settings
35
=======================
@@ -13,8 +15,8 @@ Clear Security Settings
1315
Overview
1416
--------
1517

16-
|mms| enables you to :doc:`configure the security settings
17-
</tutorial/nav/security-enable-authentication>` that your deployments
18+
|mms| enables you to :ref:`configure the security settings
19+
<enable-ldap-auth>` that your deployments
1820
use through the |mms| user interface. If you wish to reset the security
1921
settings for your deployment, you may do so using the :guilabel:`Clear
2022
Settings` button. :guilabel:`Clear Settings` clears all

source/tutorial/enable-ldap-authentication-for-group.txt

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.. _enable-ldap-auth:
22

33
=================================================
4-
Enable LDAP Authentication for your |mms| Project
4+
Manage LDAP Authentication for your |mms| Project
55
=================================================
66

77
.. default-domain:: mongodb
@@ -33,26 +33,29 @@ Directory Access Protocol (LDAP) servers via ``saslauthd`` and operating system
3333
libraries:
3434

3535
- MongoDB Enterprise for Linux can bind to an LDAP server either via
36-
``saslauthd`` or, starting in MongoDB 3.4, through the operating system
37-
libraries.
36+
``saslauthd`` or through the operating system libraries.
3837

39-
- Starting in MongoDB version 3.4, MongoDB Enterprise for Windows can
40-
bind to an LDAP server through the operating system libraries.
38+
- MongoDB Enterprise for Windows can bind to an LDAP server through the
39+
operating system libraries.
4140

42-
The :manual:`LDAP Proxy Authentication </core/security-ldap>` and
43-
:manual:`LDAP Authorization </core/security-ldap-external>` sections in
44-
the MongoDB manual provide more information about LDAP and MongoDB.
45-
Setting up LDAP and SASL is beyond the scope of this document.
41+
To learn how to set up LDAP and SASL, see the :manual:`LDAP Proxy Authentication </core/security-ldap>`
42+
and :manual:`LDAP Authorization </core/security-ldap-external>` sections in
43+
the MongoDB manual.
4644

4745
Procedure
4846
---------
4947

50-
This procedure describes how to configure and enable LDAP
51-
authentication when using Automation. If |mms| doesn't manage
52-
{+magent+} or {+bagent+}, you must manually configure them to use
53-
|ldap|. To configure |ldap|, see
54-
:doc:`/tutorial/configure-mongodb-agent-for-ldap`
48+
This procedure describes how to:
5549

56-
.. include:: /includes/note-reset-auth.rst
50+
- Configure and enable LDAP authentication when using Automation.
51+
- Rotate the LDAP password in |mms|, so that after that you can rotate
52+
the LDAP password on the LDAP server as well and then start using the
53+
new password seamlessly in |mms|.
54+
55+
If |mms| doesn't manage {+magent+} or {+bagent+}, you must manually
56+
configure them to use |ldap|. To configure |ldap|, see
57+
:doc:`/tutorial/configure-mongodb-agent-for-ldap`.
5758

5859
.. include:: /includes/steps/enable-authentication-ldap.rst
60+
61+
.. include:: /includes/note-reset-auth.rst

0 commit comments

Comments
 (0)