- Security >
- Authentication >
- Internal/Membership Authentication >
- Update Replica Set to Keyfile Authentication (No Downtime)
Update Replica Set to Keyfile Authentication (No Downtime)¶
On this page
Overview¶
To secure against unauthorized access, enforce authentication for your deployments. Authentication for replica sets consists of internal authentication among the replica set members, and user access control for clients connecting to the replica set.
If your deployment does not enforce authentication, MongoDB 3.4+ provides the
--transitionToAuth
option for performing a no-downtime upgrade to
enforcing authentication.
New in version 3.4: MongoDB 3.2 and earlier do not support a no-downtime upgrade to enforce authentication. See Update Replica Set to Keyfile Authentication for enforcing authentication in an existing MongoDB 3.2 replica set.
This tutorial uses the keyfile internal authentication mechanism for internal security, and SCRAM-based role-based access controls for client connections.
Cloud Manager and Ops Manager¶
If you are using Cloud Manager or Ops Manager to manage your deployment, see the respective Cloud Manager manual or the Ops Manager manual to enforce authentication.
Architecture¶
This tutorial assumes that your replica set can elect a new primary after stepping down the existing primary replica set member. This requires:
- A majority of voting replica set members available after stepping down the primary.
- At least one secondary member that is not delayed, hidden, or Priority 0.
Transition State¶
A mongod
running with --transitionToAuth
accepts both
authenticated and non-authenticated connections. Clients connected to the
mongod
during this transition state can perform read, write, and
administrative operations on any database.
Client Access¶
At the end of the following procedure, the replica set rejects any client attempting to make a non-authenticated connection. The procedure creates users for client applications to use when connecting to the replica set.
See ➤ Configure Role-Based Access Control for user creation and management best practices.
IP Binding¶
Changed in version 3.6.
Starting with MongoDB 3.6, MongoDB binaries, mongod
and
mongos
, bind to localhost
by default.
From MongoDB versions 2.6 to 3.4, only the binaries from the
official MongoDB RPM (Red Hat, CentOS, Fedora Linux, and derivatives)
and DEB (Debian, Ubuntu, and derivatives) packages would bind to
localhost
by default. To learn more about this change, see
Localhost Binding Compatibility Changes.
Passwords¶
Important
Passwords should be random, long, and complex to ensure system security and to prevent or delay malicious access.
Enforce Keyfile Access Control on Existing Replica Set¶
Tip
When possible, use a logical DNS hostname instead of an ip address, particularly when configuring replica set members or sharded cluster members. The use of logical DNS hostnames avoids configuration changes due to ip address changes.
Create the user administrator.¶
Connect to the primary to create a user with
userAdminAnyDatabase
role. The
userAdminAnyDatabase
role grants access to user creation
on any database in the deployment.
The following example creates the user fred
with the
userAdminAnyDatabase
role on the admin
database.
Important
Passwords should be random, long, and complex to ensure system security and to prevent or delay malicious access.
Tip
Starting in version 4.2 of the mongo
shell, you can
use the passwordPrompt()
method in conjunction with
various user authentication/management methods/commands to prompt
for the password instead of specifying the password directly in the
method/command call. However, you can still specify the password
directly as you would with earlier versions of the
mongo
shell.
At the completion of this procedure, any client that administers users in the replica set must authenticate as this user, or a user with similar permissions.
See Database User Roles for a full list of built-in roles and related to database administration operations.
Create the cluster administrator.¶
Connect to the primary to create a user with
clusterAdmin
role. The clusterAdmin
role
grants access to replication operations, such as configuring the
replica set.
The following example creates the user ravi
with the
clusterAdmin
role on the admin
database.
Important
Passwords should be random, long, and complex to ensure system security and to prevent or delay malicious access.
Tip
Starting in version 4.2 of the mongo
shell, you can
use the passwordPrompt()
method in conjunction with
various user authentication/management methods/commands to prompt
for the password instead of specifying the password directly in the
method/command call. However, you can still specify the password
directly as you would with earlier versions of the
mongo
shell.
At the completion of this procedure, any client that administrates or maintains the replica set must authenticate as this user, or a user with similar permissions.
See Cluster Administration Roles for a full list of built-in roles related to replica set operations.
Create users for client applications.¶
Create users to allow client application to connect and interact with the replica set. At the completion of this tutorial, clients must authenticate as a configured user to connect to the replica set.
See Database User Roles for basic built-in roles to use in creating read-only and read-write users.
The following creates a user with read and write permissions
on the foo
database.
Important
Passwords should be random, long, and complex to ensure system security and to prevent or delay malicious access.
Create a user with the
readWrite
role in the foo
database.
Tip
Starting in version 4.2 of the mongo
shell, you can
use the passwordPrompt()
method in conjunction with
various user authentication/management methods/commands to prompt
for the password instead of specifying the password directly in the
method/command call. However, you can still specify the password
directly as you would with earlier versions of the
mongo
shell.
Clients authenticating as this user can perform read and write operations
against the foo
database. See Authenticate a User for
more on creating an authenticated connection to the replica set.
See the Add Users tutorial for more information on adding users. Consider security best practices when adding new users.
Update Client Applications¶
At this point in the procedure, the replica set does not enforce authentication. However, client applications can still specify auth credentials and connect to the replica set.
Update client applications to authenticate to the replica set using a configured user. Authenticated connections require a username, password, and the authentication database. See Authenticate a User.
For example, the following connects to a replica set named mongoRepl
and authenticates as the user joe
.
If you do not specify the password to the -p
command-line option, the mongo
shell prompts for the
password.
If your application uses a MongoDB driver, see the associated driver documentation for instructions on creating an authenticated connection.
At the completion of this tutorial, the replica set rejects non-authenticated client connections. Performing this step now ensures clients can connect to the replica set before and after the transition.
Create a keyfile.¶
With keyfile authentication, each
mongod
instances in the replica set uses the contents of the keyfile as the
shared password for authenticating other members in the deployment. Only
mongod
instances with the correct keyfile can join the replica set.
Note
Starting in MongoDB 4.2, keyfiles for internal membership authentication use YAML format to allow for multiple keys in a keyfile. The YAML format accepts content of:
- a single key string (same as in earlier versions),
- multiple key strings (each string must be enclosed in quotes), or
- sequence of key strings.
The YAML format is compatible with the existing single-key keyfiles that use the text file format.
A key’s length must be between 6 and 1024 characters and may only contain characters in the base64 set. All members of the replica set must share at least one common key.
Note
On UNIX systems, the keyfile must not have group or world permissions. On Windows systems, keyfile permissions are not checked.
You can generate a keyfile using any method you choose. For example,
the following operation uses openssl
to generate a complex
pseudo-random 1024 character string to use as a shared password. It then
uses chmod
to change file permissions to provide read
permissions for the file owner only:
See Keyfiles for additional details and requirements for using keyfiles.
Copy the keyfile to each replica set member.¶
Copy the keyfile to each server hosting the replica set members.
Ensure that the user running the mongod
instances is the owner of the
file and can access the keyfile.
Avoid storing the keyfile on storage mediums that can be easily
disconnected from the hardware hosting the mongod
instances, such as a
USB drive or a network attached storage device.
Restart each secondary or arbiter member of the replica set with transitionToAuth
.¶
Restart each secondary or arbiter member in the replica set, including in the configuration:
- The
security.transitionToAuth
setting. Starting themongod
withsecurity.transitionToAuth
set totrue
places the instance in a transition state where it can accept and create both authenticated and non-authenticated connections. - An internal authentication mechanism such as
security.keyFile
.
You must restart each member one at a time to ensure a majority of members in the replica set remain online.
Shut down the secondary or arbiter members.¶
From a mongo
shell connected to the secondary or arbiter,
issue the db.shutdownServer()
against the admin
database.
Restart the secondary or arbiter members with transitionToAuth
¶
Specify the following settings in your configuration file.
security.keyFile
, with the path to the keyfile.replication.replSetName
to the original replica set name.security.transitionToAuth
totrue
.
Starting in MongoDB 3.6, mongod
and mongos
bind to localhost by default. If the members of your deployment are
run on different hosts or if you wish remote clients to connect to
your deployment, you must specify the net.bindIp
setting.
For more information, see Localhost Binding Compatibility Changes.
Specify the --config
option with the path to the configuration
file when starting the mongod
.
For more information on the configuration file, see configuration options.
Alternatively, you can use the equivalent mongod
command-line options (e.g. --transitionToAuth
and
--keyFile
) when starting your mongod
. See the
mongod
reference page for a complete list of options.
Include additional settings as appropriate to your deployment.
At the end of this step, all secondaries and arbiters should be up
and running with security.transitionToAuth
set to true
.
Step down the primary member of the replica set and restart it with --transitionToAuth
.¶
Step down the primary member in the replica set and restart the member, including in its configuration:
- The
security.transitionToAuth
setting. Starting themongod
withsecurity.transitionToAuth
set totrue
places the instance in a transition state where it can accept and create both authenticated and non-authenticated connections. - An internal authentication mechanism such as
security.keyFile
.
Step down the primary replica set member¶
Connect to the primary using a mongo
shell and step down the
primary using the rs.stepDown()
method.
Shut down the old primary¶
Once the primary steps down and the replica set elects a new primary,
shut down the old primary mongod
.
From a mongo
shell connected to the old primary, issue the
db.shutdownServer()
on the admin database.
Restart the old primary with transitionToAuth
¶
Specify the following settings in your configuration file.
security.keyFile
, with the path to the keyfile.replication.replSetName
to the original replica set name.security.transitionToAuth
totrue
.
Include additional options as required
for your configuration. For instance, if you wish remote clients to
connect to your deployment or your deployment members are run on
different hosts, specify the net.bindIp
setting. For more
information, see Localhost Binding Compatibility Changes.
Start the mongod
using the configuration file.
For more information on the configuration file, see configuration options.
Alternatively, you can use the equivalent mongod
command-line options (e.g. --transitionToAuth
and
--keyFile
) when starting your mongod
. See the
mongod
reference page for a complete list of options.
Include additional settings as appropriate to your deployment.
At the end of this step, all members of the replica set should be up
and running with security.transitionToAuth
set to true
and security.keyFile
set to the keyfile path.
Restart secondaries and arbiters without --transitionToAuth
¶
Restart each secondary or arbiter member in the replica set,
removing the security.transitionToAuth
option on restart. You must do
this one at a time to ensure a majority of members in the replica set remain
online.
If the majority of replica set members are offline at the same time, the replica set may go into read-only mode.
Shut down the secondary or arbiter members¶
Connect to a mongo
shell to the secondary or arbiter, and
issue the db.shutdownServer()
on the database.
Restart the secondary or arbiter members without transitionToAuth
¶
Restart the mongod
, this time without the
security.transitionToAuth
option but with internal authentication
mechanism such as security.keyFile
.
Specify the following settings in your configuration file.
security.keyFile
, with the path to the keyfile.replication.replSetName
to the original replica set name.
Include additional options as required
for your configuration. For instance, if you wish remote clients to
connect to your deployment or your deployment members are run on
different hosts, specify the net.bindIp
setting. For more
information, see Localhost Binding Compatibility Changes.
Start the mongod
using the configuration file:
For more information on the configuration file, see configuration options.
You can also use the equivalent mongod
options when starting your
mongod
. See the mongod
reference page for a complete list of
options.
Include additional settings as appropriate to your deployment.
At the end of this step, all secondaries and arbiters should be up and
running with internal authentication configured, but without
security.transitionToAuth
. Clients can only connect to these
mongod
instances by using the configured client authentication
mechanism.
Step down and restart the primary replica set member without --transitionToAuth
.¶
Step down the primary member in the replica set, then restart it
without the security.transitionToAuth
option.
Important
At the end of this step, clients not connecting with auth cannot connect to the replica set. Update clients to connect with authentication before completing this step to avoid loss of connectivity.
Step down the primary replica set member¶
Connect to the primary using a mongo
shell and step down the
primary using the rs.stepDown()
method.
Shut down the old primary¶
Once the primary steps down and the replica set elects a new primary,
shut down the old primary mongod
.
From a mongo
shell connected to the old primary, issue the
db.shutdownServer()
on the admin database.
Restart the old primary without transitionToAuth
¶
Restart the mongod
, this time without the
security.transitionToAuth
option but with the internal authentication
mechanism such as security.keyFile
.
Specify the following settings in your configuration file.
security.keyFile
, with the path to the keyfile.replication.replSetName
to the original replica set name.
Start the mongod
using the configuration file:
For more information on the configuration file, see configuration options.
You can also use the equivalent mongod
options when starting your
mongod. See the mongod
reference page for a complete list of
options.
Include additional settings as appropriate to your deployment.
At the end of this step, all members of the replica set should be up and
running with authentication enforced. Clients can only connect to these
mongod
instances by using the configured client authentication
mechanism.
x.509 Internal Authentication¶
For details on using x.509 for internal authentication, see Use x.509 Certificate for Membership Authentication.
To upgrade from keyfile internal authentication to x.509 internal authentication, see Upgrade from Keyfile Authentication to x.509 Authentication.