Secure MongoDB Self-Managed: AuthN and AuthZ
Gain expertise in securing MongoDB in self-managed environments through authentication and authorization techniques.
|
Upon completion of the Secure MongoDB Self-Managed: AuthN and AuthZ skill and skill check you will earn a Credly Badge that you are able to share with your network. |
Learning Objectives

Understand Authentication Mechanisms
Configure and differentiate various authentication options, including LDAP, Kerberos, x.509 certificates, and password-based authentication.

Configure Authentication and Authorization
Implement authentication mechanisms and enforce role-based access control (RBAC) for secure user management.

Manage Database Users and Custom Roles
Assign roles and privileges, create custom roles, and apply least privilege principles to control access.
Parker Faucher | University Curriculum Engineer
Parker is a Curriculum Engineer on the Education team at MongoDB. Prior to joining MongoDB, he helped maintain a world class developer bootcamp that was offered in multiple universities. He is a self taught developer who loves being able to give back to the community that has helped him so much.
Emily Pope | Lead Curriculum Designer
Emily Pope is a Lead Curriculum Designer at MongoDB. She loves learning and loves making it easy for others to learn how and when to use deeply technical products. Recently, she's been creating AI and vector search content for MongoDB University. Before that, she's created learning experiences on databases, computer science, full stack development, and even clinical trial design and analysis. Emily holds an Ed.M. in International Education Policy from Harvard Graduate School of Education and began her career as an English teacher in Turkiye with the Fulbright program.
Manuel Fontan Garcia | Senior Technologist, Education
Manuel is a Senior Technologist on the Curriculum team at MongoDB. Previously he was a Senior Technical Services Engineer in the Core team at MongoDB. In between Manuel worked as a database reliability engineer at Slack for a little over 2 years and then for Cognite until he re-joined MongoDB. With over 15 years experience in software development and distributed systems, he is naturally curious and holds a Telecommunications Engineering MSc from Vigo University (Spain) and a Free and Open Source Software MSc from Rey Juan Carlos University (Spain).
Katie Redmiles | Senior Curriculum Designer
Katie is a Senior Curriculum Designer at MongoDB. Before joining the Curriculum team, Katie worked on the University Enablement team developing Learning Bytes and instructional materials for the MongoDB for Academia program. Katie also worked within the Digital Learning Division at the Foreign Service Institute where she honed her skills at developing online learning for a global audience. Katie is passionate about making education accessible and engaging for everyone.
I am excited to guide you through this skill on securing your self managed MongoDB instance.
Here, you'll learn essential skills to secure your MongoDB deployments by enforcing authentication and authorization.
Understanding these concepts is crucial for any developer as they are foundational for application security.
By mastering authentication and authorization in MongoDB, you'll be able to protect sensitive data and implement best practices in user management and access control.
This knowledge will enable you to confidently and efficiently build robust and secure systems.
As developers, we come across these two terms frequently.
We also use authentication and authorization in many facets of our lives.
Imagine you're booking a hotel room. When you check-in at the front desk, you need to provide an ID that matches your reservation.
This process is a form of authentication.
It verifies your identity.
Once your ID is confirmed to match the booking, you're authenticated and given a keycard which authorizes you to access your room.
If you try to use your key card to open a different room, it won't work because you aren't authorized to enter any other room.
Authorization grants a user permissions for accessing resources and performing actions.
Now consider the hotel's cleaning staff. They have broader access privileges. Since it's their responsibility to keep the hotel rooms clean, they can enter every guest room.
However, their authorization doesn't include access to a guest safe. This illustrates how authorization works by granting varying levels of access using both authentication and authorization.
The hotel ensures that guests, their belongings, and staff are safe and satisfied. We can apply these same principles to MongoDB deployments.
We'll cover what you need to know about authentication and authorization in MongoDB.
Let's start off by taking a closer look at what authentication and authorization means from MongoDB deployments.
After that, we'll explore the different authentication methods available for database users.
We'll also investigate the use cases for each method. Finally, we'll move on to authorization for database users.
Here, we'll learn about role based access control and how it's used in MongoDB.
This skill will introduce concepts through detailed videos and hands on labs.
Then, you'll be ready to take our short skill check to demonstrate your knowledge. After passing the skill check, you'll receive an official Credly badge to share on LinkedIn.
That way, you can show off your newly acquired knowledge and skills. Let's get started.
