Workforce Identity Federation with OpenID Connect
On this page
Workforce Identity Federation uses OpenID Connect (OIDC) to enable human users to authenticate and get authorized using an external identity provider (IdP). You can use Workforce Identity Federation to enhance security and simplify user management.
Use Cases
With Workforce Identity Federation, you can:
Manage your workforce access to MongoDB deployments through your existing IdP.
Enforce security policies such as password complexity, credential rotation, and multi-factor authentication within your IdP.
Grant access for a group of users or a single user.
Behavior
You must use MongoDB Enterprise and have MongoDB 7.0.11 or later.
To verify that you are using MongoDB Enterprise, pass the --version
command line option to the mongod
or mongos
:
mongod --version
In the output from this command, look for the string modules:
subscription
or modules: enterprise
to confirm you are using the
MongoDB Enterprise binaries.
Get Started
To configure and use Workforce Identity Federation, you must perform the following tasks:
Configure an External Identity Provider
Register your OIDC application with an IdP that supports the OIDC standard, such as Microsoft Entra ID, Okta, or Ping Identity.
Configure MongoDB with Workforce Identity Federation
Configure your MongoDB server to use Workforce Identity Federation with OIDC.
Specify privileges for workforce identity principals by adding roles to MongoDB (for OIDC, external authorization, or both) or adding database users to MongoDB (for database-managed authorization).