Useful Links
Computer Science
Databases
MongoDB Database
1. Introduction to NoSQL and Document Databases
2. Getting Started with MongoDB
3. The MongoDB Data Model
4. CRUD Operations: Manipulating Data
5. Indexing for Performance
6. The Aggregation Framework
7. Transactions
8. Scalability and High Availability
9. Security in MongoDB
10. Administration and Ecosystem
Security in MongoDB
Authentication
Enabling Authentication
Configuration Steps
Initial User Creation
Authentication Database Setup
Authentication Mechanisms
SCRAM-SHA-1
SCRAM-SHA-256
x.509 Certificate Authentication
LDAP Authentication
Kerberos Authentication
User Management
Creating and Managing Users
Password Policies
User Account Maintenance
Authorization (Role-Based Access Control)
Users and Roles
User Creation and Management
Role Assignment and Inheritance
User Authentication Database
Built-in Roles
Database User Roles
read
readWrite
Database Administration Roles
dbAdmin
dbOwner
userAdmin
Cluster Administration Roles
clusterAdmin
clusterManager
clusterMonitor
Backup and Restoration Roles
backup
restore
All-Database Roles
readAnyDatabase
readWriteAnyDatabase
userAdminAnyDatabase
dbAdminAnyDatabase
Superuser Roles
root
Creating Custom Roles
Role Definition Syntax
Privilege Specification
Resource Targeting
Action Assignment
Privileges and Actions
Database-Level Privileges
Collection-Level Privileges
Cluster-Level Privileges
Action Categories and Permissions
Encryption
Encryption in Transit (TLS/SSL)
TLS/SSL Configuration
Certificate Management
Certificate Authority Setup
Client Certificate Authentication
Encryption at Rest
Encrypted Storage Engines
Key Management Systems
Master Key Rotation
Performance Considerations
Field-Level Encryption
Client-Side Field Level Encryption
Automatic Encryption
Key Management
Auditing
Audit Configuration
Enabling Audit Logging
Audit Filter Configuration
Audit Destination Options
Audit Event Types
Authentication Events
Authorization Events
DDL Events
DML Events
Reviewing Audit Logs
Log Format and Structure
Log Analysis Techniques
Compliance Reporting
Network Security Best Practices
IP Whitelisting and Blacklisting
Firewall Configuration
Network Interface Binding
VPN and Private Network Usage
Disabling Unused Network Interfaces
Limiting Network Exposure
Secure Connection Practices
Previous
8. Scalability and High Availability
Go to top
Next
10. Administration and Ecosystem