Security Reference
This version of the documentation is archived and no longer
supported. View the current documentation to learn how to
upgrade your version of MongoDB.
The following lists the security related methods available in the
mongo
shell as well as additional security reference material.
Security Methods in the mongo
Shell
User Management and Authentication Methods
Name | Description |
---|---|
Authenticates a user to a database. | |
Changes an existing user's password. | |
Creates a new user. | |
Removes a single user. | |
Deletes all users associated with a database. | |
Returns information about the specified user. | |
Returns information about all users associated with a database. | |
Grants a role and its privileges to a user. | |
Deprecated. Removes a user from a database. | |
Removes a role from a user. | |
Updates user data. | |
Prompts for the password as an alternative to specifying passwords
directly in various mongo shell user
authentication/management methods. |
Role Management Methods
Name | Description |
---|---|
Creates a role and specifies its privileges. | |
Deletes a user-defined role. | |
Deletes all user-defined roles associated with a database. | |
Returns information for the specified role. | |
Returns information for all the user-defined roles in a database. | |
Assigns privileges to a user-defined role. | |
Removes the specified privileges from a user-defined role. | |
Specifies roles from which a user-defined role inherits privileges. | |
Removes inherited roles from a role. | |
Updates a user-defined role. |
Security Reference Documentation
system.roles
Collection- Describes the content of the collection that stores user-defined roles.
system.users
Collection- Describes the content of the collection that stores users' credentials and role assignments.
- Resource Document
- Describes the resource document for roles.
- Privilege Actions
- List of the actions available for privileges.