Global admin connection user MongoDB 2.6 - mongodb

I have mongodb server with auth=true and many databases. I'm trying to connect to it remotely using admin database:
mongo --host xxx admin --username admin --password secretPassword
(WORK)
mongo --host xxx products --username admin --password secretPassword
(DOESN'T WORK)
I can connect to admin database and switch to products. But developers using connection string to connect to specific database using same username and password.
I can create admin user for each database but databases are pretty dynamic some added some removed. I've read thread about global admin but set up user role doesn't help
roles: [ { role: "userAdminAnyDatabase", db: "admin" } ]
and
--authenticationDatabase
Is not an option because a lot of code has to be rewritten.
Is there a way to setup one global admin that anyone can connect to remote database with username and password?

If you are using MongoDB 3.0+, the default location for users is the admin database. You will have to use --authenticationDatabase in this case going forward anyway.
With centralized users, you can define roles with access to all databases as necessary:
https://docs.mongodb.org/manual/reference/built-in-roles/
It sounds like you may want to refactor the database connection code, especially if "a lot of code" has to be rewritten, that sounds like you haven't been following DRY--"don't repeat yourself" principles.

Related

After migrating to MongoDB Atlas, no previous users can authenticate

I assume I am doing something wrong, but the documentation has not pointed me in the right direction yet.
I am migrating a self-hosted MongoDB instance database to the MongoDB Atlas platform. I have successfully uploaded a dump using mongorestore, but now none of my users objects can authenticate. I want to say I read somewhere in the docs that you can't migrate pre-existing users or something?
This is the command I am using to restore from a dump
mongorestore --host <MY_CLUSTER>:27017 --nsExclude 'admin.system.*' --ssl --username <USER> --password <PASSWORD> --authenticationDatabase admin --gzip --db=<DB_NAME> .backups/12-23-2019/backup/
You cannot restore users to atlas structure as mentioned before
you have to configure a mongocli environment to mass create users in your Atlas cluster, unless you want to use the "Database Access" panel and create one by one (painful).
Not gonna go into details about how to configure mongocli, but once you've done with it, I made a simple script that retrieve all the users from you original server and script into the create users into mongocli, it uses mongo shell and jq.
mongo mongodb://youroriginalcluster --quiet --eval 'db.system.users.find({}, {"user" : 1, "db" : 1, "roles" : 1}).toArray();' | jq -r '.[] | " mongocli atlas dbuser create --username \(.user) --password PASSWORD --role \(.roles[].role)#\(.db)"'
Still needs some minor adjustments and it does not retrieve the password, but it should save you some time
mongorestore has a specific option for restoring users and roles: --restoreDbUsersAndRoles (note that it works only if you backed an entire instance or used the --dumpDbUsersAndRoles option with mongodump for a single --db).
Regardless of this, Atlas does not support migrating users from the source database since it manages users from the Atlas console rather than in the database itself. Users can be created in Atlas using the Database Access menu option.
From the Atlas Manual:
Atlas fully manages MongoDB database user creation. If the source cluster enforces authentication, use the mongorestore --nsExclude to exclude the admin.system.* namespace. You cannot migrate any existing user or role information to Atlas.

MongoDB Authentication Database Purpose

My question is about the mongo shell --authenticationDatabase option.
I was confused by it for a bit thinking that the the database I created the user in was the admin database since that is where the user is actually defined after reading this documentation here: https://docs.mongodb.com/manual/core/security-users/#user-management-interface
I understand I was wrong; the authentication database is the database the user has a role for. My question then is what is the purpose of the option "--authenicationDatabase?" See my scenarios below.
The command below will connect to the myapp database and also authenticate against the myapp database
mongo -u "bob" -p "bobspassword" --authenticationDatabase "myapp" myapp
The command below will connect to the myapp database and also authenticate against the myapp database by default. This seems to make the command above obsolete.
mongo -u "bob" -p "bobspassword" --authenticationDatabase "myapp" myapp
The command below will authenticate against the myapp database but not connect to it. Why? Is it simply to test credentials?
mongo -u "bob" -p "bobspassword" --authenticationDatabase "myapp"
This command would tell me "Error: Authentication failed." as well so I still wonder why I would need the previous command to find out my credentials are invalid.
mongo -u "bob" -p "bobspassword" myapp
Lastly, is there a situation where I need to authenticate against one database and connect to a different one like the command below? I can only connect to databases for which I have a role defined so why wouldn't I authenticate against the database I was trying to connect to?
mongo -u "bob" -p "bobspassword" --authenticationDatabase "myapp" myotherapp
Thank you for your insight!
In mongo you are connecting to a server not really to a database. You can change the database afterwards.
your code:
mongo -u "bob" -p "bobspassword" --authenticationDatabase "myapp"
will connect to mongod server and it will use a 'test' database if others not defined
The next one should work, since mongo takes the auth db from the connection string. Also it might be set different in a config file.
mongo -u "bob" -p "bobspassword" myapp
And final:
Lastly, is there a situation where I need to authenticate against one
database and connect to a different one..
No
When adding a user, you create the user in a specific database. This database is the authentication database for the user.
In most cases, you would want to create users in the admin database. This is a privileged database. However, you are allowed to create user in other databases. If two users have the same name but are created in different databases, they are two separate users. IMHO, this authentication database mechanism provides a sort of namespace so that users with same name are allowed (think about user management in a big organization).
But this is just how Mongo organize users and store then in authentication databases. The authentication database has nothing to do with to which databases this user has privilege (access).
Back to your case, you created a user in 'myapp' database and also grant it access to 'myapp' database. That's why you need to first authenticate against 'myapp', which serves as authentication database, and then connect to 'myapp' for accessing data.

mongodb backup role - mongodump

We have a development team that will periodically take a mongodump out of DEV and then restore it back to their local host for work. We have recently implemented authentication in mongodb and i would like to be able to allow our development team do a mongodump on one DB only so they can restore it to their local host.
I have a role that inherits the backup role from Admin, but that is for our DBA to backup the whole system.
My question, how do I allow for this backup role to be used by a specific user (lets call them "webdev") for a specific DB (lets call it "products")?
You can create an user in the products database with read permissions:
> use products
> db.createUser( {
user: "webdev",
pwd: "password",
roles: [ "read" ]
} )
Just remember to call mongodump with --excludeCollectionsWithPrefix=system
mongodump --excludeCollectionsWithPrefix=system
In order to avoid permission errors (assuming you are using Mongo 3)
I am using MongoDB3.4 version, First of all you want one root access for admin database and connect mongo shell,
$ mongo -u username -p xxxxxx --authenticationDatabase admin
After connecting mongoshell, change the database,
use products
After change the DB create the new user,
db.createUser(
{
user: "webdev",
pwd: "xxxxx",
roles: [
{ role: "read", db: "products" },
{ role: "backup", db: "products"}
]
}
)
Above I mentioned, webdev user can be able to read the all collections and take backup access also.
db.auth('webdev', 'xxxxx')
after successfully authenticate, you can able to read and take backup from DEV server.
Below I mentioned mongodump query with new webdev user.
mongodump --host hostname --port 27017 --username webdev --password xxxxx --authenticationDatabase products --db products --collection collection_name --out mongodump_outpath
Refer: https://docs.mongodb.com/manual/reference/built-in-roles/#backup
Note:
Don't take mongodump frequently in production. It will impacts the
performance issue.
Don't give backup and restore access to any other teams like developer,
tester,..etc
Admin or DBA only do every time Backup/Restore.
Thank You. Please revert for any concern.

How to give diagnostic actions listDatabases to a user in mongodb?

I'm trying to connect from a java application to a mongodb database in openshift and I'm having some trouble with roles and actions allowed.
I run the rch port-forward command like so:
rhc port-forward -a test
it all goes great and I'm able to connect to the database using:
mongo admin -u admin -p '*******' --host 127.0.0.1 --port 44506
and I can execute commands like:
> use test
> show databases
But if i connect directly to my database using:
mongo test -u admin -p '*******' --host 127.0.0.1 --port 44506
I'm unable to run the show databases command
listDatabases failed:{ "ok" : 0, "errmsg" : "unauthorized" } at src/mongo/shell/mongo.js:47
How can i give action listDatabases to this user in this database?
I found this page in the mongodb documentation http://docs.mongodb.org/manual/reference/privilege-actions/#security-user-actions
Which talks about Diagnostic Actions but does not mention how to give such action to a user.
Thanks for the help.
As mentioned by wdberkeley, you have to have a user in the admin database with the ability to list databases.
To do this, you first have to create a very minimal "role" for this user allowing them to list databases, and then create a user with both this role and the role for reading and writing your other database:
use admin
db.runCommand({ createRole: "listDatabases",
privileges: [
{ resource: { cluster : true }, actions: ["listDatabases"]}
],
roles: []
})
db.createUser({
user: "<userName>",
pwd: "<passwd>",
roles: [
{ role: "readWrite", db: "test" },
{ role: "listDatabases", db: "admin" }
]
})
The MongoDB documentation has references for both createRole and createUser, if you want to learn more about these commands.
You're logging in as two different users. Users are scoped by namespace, so user John who lives in test is not the same as user John who lives in admin, though both Johns may have rights in the test database. I think this much you may already understand, but I wanted to clarify it just in case.
I don't believe you can give a user scoped to a non-admin database the listDatabases action in a privilege because the listDatabases action must go with the cluster resource (listDatabases is a cluster-wide sort of operation), and a privilege with a cluster resource can only be scoped to a role on the admin database. Cutting out the jargon of MongoDB's authorization model, a non-admin database user can't use listDatabases because it's a cluster-wide operation and only admin database users should be able to do cluster-wide things.
Just want to add the approach mentioned by i80and works on MongoDB 3.2.3
create custom role that contain listDatabase and specify cluster:true, I did it when specify resource as db, it doesn't work
grant this role to user
Note: make sure you are connected to the correct db when performing security task because you will need to be authenticated using this specific db where the user is created

How can I create one user that have complete access to MongoDB?

This is really bugging me. I intend to create one user that controls all access to my MongoDB and also use the same user for all my applications. I realize having separate users would be even more secure but I want to keep this simple.
Unfortunately, it does not seem so straightforward to give superuser access. So far I have given the admin user as:
db.addUser({user:"admin", pwd:"ppp",
roles: ["clusterAdmin", "readWriteAnyDatabase", "dbAdminAnyDatabase", "userAdminAnyDatabase"] } )
But admin can still not be used to authenticate against another db than admin db itself. For example
mongo raconteurdb -u admin -p
MongoDB shell version: 2.4.9
Enter password:
connecting to: raconteurdb
Tue Apr 1 10:10:57.109 Error: 18 { code: 18, ok: 0.0, errmsg: "auth fails" } at src/mongo/shell/db.js:228
Do I need to set access for each DB separate? Will I lose that access when those DBs are dropped?
RipperDoc,
You can use the admin users to authenticate for any database. If the appropriate privileges were setup for the user, you could have used following:
mongo raconteurdb -u admin -p --authenticationDatabase admin
This will authenticate "admin" user setup in the "admin" database and "raconteurdb" will be default db on the mongo-shell.