Docs Menu
Docs Home
/
MongoDB Manual
/ / / /

Workforce Identity Federation with OpenID Connect

On this page

  • Use Cases
  • Behavior
  • Get Started

Workforce Identity Federation uses OpenID Connect (OIDC) to enable human users to authenticate and get authorized using an external identity provider (IdP). You can use Workforce Identity Federation to enhance security and simplify user management.

With Workforce Identity Federation, you can:

  • Manage your workforce access to MongoDB deployments through your existing IdP.

  • Enforce security policies such as password complexity, credential rotation, and multi-factor authentication within your IdP.

  • Grant access for a group of users or a single user.

You must use MongoDB Enterprise and have MongoDB 7.0.11 or later.

To verify that you are using MongoDB Enterprise, pass the --version command line option to the mongod or mongos:

mongod --version

In the output from this command, look for the string modules: subscription or modules: enterprise to confirm you are using the MongoDB Enterprise binaries.

To configure and use Workforce Identity Federation, you must perform the following tasks:

  1. Configure an External Identity Provider

    Register your OIDC application with an IdP that supports the OIDC standard, such as Microsoft Entra ID, Okta, or Ping Identity.

  2. Configure MongoDB with Workforce Identity Federation

    Configure your MongoDB server to use Workforce Identity Federation with OIDC.

  3. Authorize Users

    Specify privileges for workforce identity principals by adding roles to MongoDB (for OIDC, external authorization, or both) or adding database users to MongoDB (for database-managed authorization).

Back

OIDC/OAuth 2.0