diff --git a/source/includes/steps-configure-ldap-sasl-activedirectory-authentication.yaml b/source/includes/steps-configure-ldap-sasl-activedirectory-authentication.yaml index c7369d71a24..e894d276c69 100644 --- a/source/includes/steps-configure-ldap-sasl-activedirectory-authentication.yaml +++ b/source/includes/steps-configure-ldap-sasl-activedirectory-authentication.yaml @@ -44,7 +44,7 @@ pre: | :setting:`security.ldap.servers`. You must also enable LDAP authentication by setting - :setting:`security.authentication` to `enabled` and :setting:`setParameter` + :setting:`security.authorization` to `enabled` and :setting:`setParameter` :parameter:`authenticationMechanisms` to ``PLAIN`` .. example:: @@ -56,7 +56,7 @@ pre: | .. code-block:: yaml security: - authentication: "enabled" + authorization: "enabled" ldap: servers: "activedirectory.example.net" setParameter: diff --git a/source/includes/steps-kerberos-auth-activedirectory-authz.yaml b/source/includes/steps-kerberos-auth-activedirectory-authz.yaml index e27ae73f12e..1ddd2ada145 100644 --- a/source/includes/steps-kerberos-auth-activedirectory-authz.yaml +++ b/source/includes/steps-kerberos-auth-activedirectory-authz.yaml @@ -231,7 +231,7 @@ ref: security-kerberos-activedirectory-authauthz-configurebinding level: 4 pre: | - In the MongoDB configuration file, set :setting:`security.authentication` to + In the MongoDB configuration file, set :setting:`security.authorization` to `enabled` and :setting:`setParameter` :parameter:`authenticationMechanisms` to ``GSSAPI`` @@ -242,7 +242,7 @@ pre: | .. code-block:: yaml security: - authentication: "enabled" + authorization: "enabled" setParameter: authenticationMechanisms: "GSSAPI" diff --git a/source/reference/program/mongoldap.txt b/source/reference/program/mongoldap.txt index 0a1ba4429bf..25dc96ab36c 100644 --- a/source/reference/program/mongoldap.txt +++ b/source/reference/program/mongoldap.txt @@ -68,7 +68,7 @@ LDAP authentication and authorization via Active Directory: .. code-block:: yaml security: - authentication: "enabled" + authorization: "enabled" ldap: servers: "activedirectory.example.net" bind: @@ -84,7 +84,7 @@ LDAP authentication and authorization via Active Directory: authz: queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))" setParameter: - authenticationMechanism: "PLAIN" + authenticationMechanisms: "PLAIN" You can use :program:`mongoldap` to validate the configuration file, which returns a report of the procedure. You must specify a username and password @@ -92,7 +92,7 @@ for :program:`mongoldap`. .. code-block:: shell - mongoldap --config --username "bob@dba.example.com" --password "secret123" + mongoldap --config --user "bob@dba.example.com" --password "secret123" If the provided credentials are valid, and the LDAP options in the configuration files are valid, the output might be as follows: diff --git a/source/tutorial/authenticate-nativeldap-activedirectory.txt b/source/tutorial/authenticate-nativeldap-activedirectory.txt index 33919a302be..831e2930a7b 100644 --- a/source/tutorial/authenticate-nativeldap-activedirectory.txt +++ b/source/tutorial/authenticate-nativeldap-activedirectory.txt @@ -159,7 +159,7 @@ This procedure produces the following configuration file: .. code-block:: yaml security: - authentication: "enabled" + authorization: "enabled" ldap: servers: "activedirectory.example.net" bind: @@ -175,7 +175,7 @@ This procedure produces the following configuration file: authz: queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))" setParameter: - authenticationMechanism: "PLAIN" + authenticationMechanisms: "PLAIN" The given sample configuration requires modification to match your Active Directory schema, directory structure, and configuration. You may also require diff --git a/source/tutorial/kerberos-auth-activedirectory-authz.txt b/source/tutorial/kerberos-auth-activedirectory-authz.txt index 684e5156749..2190c056ae7 100644 --- a/source/tutorial/kerberos-auth-activedirectory-authz.txt +++ b/source/tutorial/kerberos-auth-activedirectory-authz.txt @@ -178,7 +178,7 @@ This procedure produces the following configuration file: .. code-block:: yaml security: - authentication: "enabled" + authorization: "enabled" ldap: servers: activedirectory.example.net" bind: @@ -194,7 +194,7 @@ This procedure produces the following configuration file: authz: queryTemplate: "DC=example,DC=com??sub?(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={USER}))" setParameter: - authenticationMechanism: "GSSAPI" + authenticationMechanisms: "GSSAPI" .. important::