Create admin user that can authenticate to any database (even those that do not exist yet) - mongodb

I am trying to make an admin user, which can authenticate to any database. When I do something like this:
db.createUser({
"user": "admin",
"pwd": "adminPassword",
"roles": [
"userAdminAnyDatabase",
"dbAdminAnyDatabase",
"readWriteAnyDatabase"
]
});
It works fine when connecting to the admin database. However, it doesn't work when I try something like this: mongodb://admin:adminPassword#localhost:27017/someDatabaseHere. I cannot authenticate to someDatabaseHere unless I authenticate to the admin database first, then go change stuff around in someDatabaseHere afterwards.
I really want to get the URI working as above, without needing to create an user for each database afterwards.
Alternatively, I would like to authenticate locally without credentials (simply mongodb://localhost:27017/someDatabaseHere) but require credentials remotely. That could work as well.

unless I authenticate to the admin database first, then go change stuff around in someDatabaseHere afterwards.
Currently (as of MongoDB 3.4.10), this is how the authentication mechanism works. This is the purpose of the --authenticationDatabase parameter. If the user is defined in the admin database, then it should have access to all databases on the server, existing or not.
I would like to authenticate locally without credentials
Currently this is not possible, since MongoDB uses a role-based authentication scheme and not IP-based authentication.

Related

Can't add admin user in Mongo 3.6.8

I'm trying to add an admin user in Mongo, but I'm having trouble.
I already have auth = true commented out inside /etc/mongodb.conf.
When I run Mongo, I run these commands in order:
mongo
use admin
db.createUser({user:"admin",pwd:"password",roles:["root"]});
When I do so, I encounter the following error:
2020-10-11T04:50:50.714+0000 E QUERY [thread1] Error: couldn't add user: there are
no users authenticated :
_getErrorWithCode#src/mongo/shell/utils.js:25:13
DB.prototype.createUser#src/mongo/shell/db.js:1437:15
#(shell):1:1
I'm not sure exactly how to create an admin user if I have to log in as an admin user to do so. Any help is appreciated!
You don't have to disable authentication. With authentication enabled you can still logon to your MonogDB without username/password. However, as soon as you create the first user with userAdmin or userAdminAnyDatabase role the access control becomes active and you have to authenticate.
This behavior is called Localhost Exception
Is this the first user to try to create? Perhaps another admin user already exist. See also How do I create a the first mongodb user with authorization enabled?
I just gave up and started over with a new database, after exporting the old one as a backup.
For creating a user you will have to have a user in admin database first. So while creating user you need to provide db name and role both. Try creating user with below syntax.
use admin
db.createUser(
{
user: "myUserAdmin",
pwd: "password"
roles: [ { role: "userAdminAnyDatabase", db: "admin" }, "readWriteAnyDatabase" ]
}
)
Reference-
https://docs.mongodb.com/manual/tutorial/enable-authentication/

mongodb restrict access for local users

i have a mongodb database on a windows server and i already created a user on it with below command and it work fine for remote users, but still someone with access on windows server can run mongod command without auth parameter and then he can access the database, how can i prevent this from happening, i couldn't find any solution on web
thanks
db.createUser({
user: "accountAdmin01",
pwd: passwordPrompt(),
roles: [{role: "readAnyDatabase", db: "admin"}, "readWrite"]
})
A user with access to the database's files can copy the files to their own computer and run the database themselves.
Any human being with the ability to log in to the database's user account has full access to the database's files.
Thanks D.SM, it solved by creating different account on the vps with no read/write access on db folder by the others

How can I query users created in $external database

I'm trying to configure certificate based mongo authentication, generally it works fine but there's one question I cannot find answer for. Suppose I created a user in $external database:
use $external
db.createUser({user: "emailAddress=jsmith#example.com,CN=jsmith,OU=Mongo Admins,O=Initech,C=US",
roles: [{"role" : "root","db" : "admin"}]
})
Q: How can I query the content of $external database, particularly users data?
Is there any similar way to:
use admin
db.system.users.find()
The "$external" database isn't a real database, and it contains no data. All users and roles data for all databases is stored in admin.system.users or admin.system.roles.
The preferred solution is to use the getUsers command.
In the shell, you would issue the following statements:
use $external
db.getUsers()
If you have the right privileges, you can also query admin.system.users to find the users for any database, as follows:
use admin
db.system.users.find({db: "$external"})

Start MongoDB in authentication mode in Ubuntu server

We have installed MongoDB in AWS and it is running in without Authentication mode. But we want to run MongoDB instance in authentication mode. We have added the line security:
authorization: "enabled" in mongod.conf file . But still we are able to connect our database without any credentials.
You are able to login because of localhost exception, you can login in DB to create users, as you haven't created any yet. As mentioned in mongodb site.
You can create users either before or after enabling access control.
If you enable access control before creating any user, MongoDB
provides a localhost exception which allows you to create a user
administrator in the admin database. Once created, you must
authenticate as the user administrator to create additional users as
needed.
After it you should create Admin user with role userAdminAnyDatabase, and you will be able to create this user even mongod is started with --auth or not. you can create this user by below command.
use admin
db.createUser(
{
user: "myAdmin",
pwd: "123adc",
roles: [ { role: "userAdminAnyDatabase", db: "admin" } ]
}
)
And then create other users, for more detail you can go to another answer given by me.
https://stackoverflow.com/a/40058794/3879440

Locked out of my own mongodb instance

I've created two users, who I thought were userAdmins. Unfortunately, when I login with them, I get permission denied for everything. If I login locally without providing a username or password, I get permission denied for everything. What can I do?
The users were created using the following commands
use admin
db.createUser(
{
user: "Nikhil",
pwd: "wouldntyouliketoknow",
roles: ["userAdminAnyDatabase" ]
}
)
Does userAdminAnyDatabase not mean what I think it means?
I'm using that you've got authorization security enabled for this to be happening. Why don't you just set security.authorization to disabled and restart mongod?
http://docs.mongodb.org/manual/reference/configuration-options/
As far as the command you issued it looks to be incorrect, should be something like this:
use admin
db.createUser(
{
user: "Nikhil",
pwd: "wouldntyouliketoknow",
roles:
[
{
role: "userAdminAnyDatabase",
db: "admin"
}
]
}
)
Note that you have to pass in a document with both the role and the db into the call.
Best starting point is here: http://docs.mongodb.org/manual/tutorial/enable-authentication/
This user is limited to the userAdmin role on all databases. If you want to perform additional actions you'll need to either grant yourself additional roles or create a new user who has them:
userAdminAnyDatabase
Provides the same access to user administration operations as userAdmin, except it applies to all databases in the cluster. The role also provides the following actions on the cluster as a whole:
authSchemaUpgrade
invalidateUserCache
listDatabases
The role also provides the following actions on the admin.system.users and admin.system.roles collections on the admin database, and on legacy system.users collections from versions of MongoDB prior to 2.6:
collStats
dbHash
dbStats
find
killCursors
planCacheRead
The userAdminAnyDatabase role does not restrict the permissions that a user can grant. As a result, userAdminAnyDatabase users can grant themselves privileges in excess of their current privileges and even can grant themselves all privileges, even though the role does not explicitly authorize privileges beyond user administration. This role is effectively a MongoDB system superuser.
http://docs.mongodb.org/manual/reference/built-in-roles/#built-in-roles
You can simply restart your MongoD without the auth options and it should happily allow you to login and do any operations.
Alternatively you can also enable the bypass for localhost authentication and connect from the same host where you the MongoD is running. You can find more information about it at http://docs.mongodb.org/manual/core/authentication/#localhost-exception
The above mentioned steps may have different behaviour based on version of MongoDB you are using and I would suggest looking up version specific documentation at the mentioned website.