程序師世界是廣大編程愛好者互助、分享、學習的平台,程序師世界有你更精彩!
首頁
編程語言
C語言|JAVA編程
Python編程
網頁編程
ASP編程|PHP編程
JSP編程
數據庫知識
MYSQL數據庫|SqlServer數據庫
Oracle數據庫|DB2數據庫
 程式師世界 >> 數據庫知識 >> SyBase數據庫 >> SyBase教程 >> MongoDB基礎(六)安全性(權限操作)

MongoDB基礎(六)安全性(權限操作)

編輯:SyBase教程

MongoDB基礎(六)安全性(權限操作)


和其他所有數據庫一樣,權限的管理都差不多一樣。mongodb存儲所有的用戶信息在admin 數據庫的集合system.users中,保存用戶名、密碼和數據庫信息。mongodb默認不啟用授權認證,只要能連接到該服務器,就可連接到mongod。若要啟用安全認證,需要更改配置文件參數auth。

以下測試理解

查看數據庫:

 

> show dbs
發現 admin 竟然沒有!~

 

找了好久,找不到相關說明,於是直接創建用戶admin

 

use admin


db.createUser(
  {
    user: "admin",
    pwd: "admin",
    roles: [ { role: "userAdminAnyDatabase", db: "admin" } ]
  }
)
成功創建,再查詢admin中的集合,有數據了!

 

 

> show collections
system.indexes
system.users
system.version

查看3個集合的信息:

 

 

> db.system.users.find();
{ "_id" : "admin.admin", "user" : "admin", "db" : "admin", "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "cFISfpbm04pmIFpqiL340g==", "storedKey" : "WG1DSEEEHUZUBjsjsnEA4RFVY2M=", "serverKey" : "9Lm+IX6l9kfaE/4C25/ghsQpDkE=" } }, "roles" : [ { "role" : "userAdminAnyDatabase", "db" : "admin" } ] }
> 
> db.system.indexes.find();
{ "v" : 1, "key" : { "_id" : 1 }, "name" : "_id_", "ns" : "admin.system.version" }
{ "v" : 1, "key" : { "_id" : 1 }, "name" : "_id_", "ns" : "admin.system.users" }
{ "v" : 1, "unique" : true, "key" : { "user" : 1, "db" : 1 }, "name" : "user_1_db_1", "ns" : "admin.system.users" }
> 
> db.system.version.find();
{ "_id" : "authSchema", "currentVersion" : 5 }
> 

現在啟用 auth:
[root@localhost ~]# vi /etc/mongod.conf

 

 

auth=true

重啟 mongod 服務:

 

[root@localhost ~]# service mongod restart

直接默認登錄,查看集合,發現無權操作了:

[root@localhost ~]# mongo

 

[root@localhost ~]# mongo
MongoDB shell version: 3.0.2
connecting to: test
> show dbs
2015-05-09T21:57:03.176-0700 E QUERY    Error: listDatabases failed:{
	"ok" : 0,
	"errmsg" : "not authorized on admin to execute command { listDatabases: 1.0 }",
	"code" : 13
}
    at Error ()
    at Mongo.getDBs (src/mongo/shell/mongo.js:47:15)
    at shellHelper.show (src/mongo/shell/utils.js:630:33)
    at shellHelper (src/mongo/shell/utils.js:524:36)
    at (shellhelp2):1:1 at src/mongo/shell/mongo.js:47
> 


 

剛才在數據庫 admin 創建了一個賬戶 admin ,先到數據admin進來連接(其他db則失敗):

 

[root@localhost ~]# mongo
MongoDB shell version: 3.0.2
connecting to: test
>
> db.auth("admin","admin")
Error: 18 Authentication failed.
0
> use mydb
switched to db mydb
> db.auth("admin","admin")
Error: 18 Authentication failed.
0
> use admin
switched to db admin
> db.auth("admin","admin")
1
> 

db.auth("admin","admin") 返回值為1,說明登錄成功!~db.auth("admin","admin") 記錄是不存在的,執行完後這一行在shell中不會記錄歷史。

 

所以現在創建另一個用戶"myuser"

 

db.createUser(
  {
    user: "myuser",
    pwd: "myuser",
    roles: [ { role: "readWrite", db: "mydb" } ]
  }
)

也可以增刪角色:

 

 

#授予角色:db.grantRolesToUser( "userName" , [ { role: "", db: "" } ])

db.grantRolesToUser( "myuser" , [ { role: "dbOwner", db: "mydb" } ])


#取消角色:db.grantRolesToUser( "userName" , [ { role: "", db: "" } ])

db.revokeRolesFromUser( "myuser" , [ { role: "readWrite", db: "mydb" } ])

因為在admin數據庫創建的,只能在 admin 數據庫中登錄:

 

 

> db.auth("myuser","myuser")
Error: 18 Authentication failed.
0
> 
> db
mydb
> use admin
switched to db admin
> db.auth("myuser","myuser");
1
> 

此時是可以切換到所在的數據庫進行相關操作:

 

 

> use mydb
switched to db mydb
> 
> db.tab.save({"id":999});
WriteResult({ "nInserted" : 1 })
> 
> db.tab.find({"id":999});
{ "_id" : ObjectId("554ef5ac1b590330c00c7d02"), "id" : 999 }
> 
> show collections
system.indexes
tab
> 

在創建用戶時可以在其數據庫中創建,這樣不用每次都進入admin數據庫登錄後再切換。如在數據庫"mydb"創建用戶"userkk"。

 

 

use admin

db.auth("admin","admin")

use mydb

db.createUser(
  {
    user: "userkk",
    pwd: "userkk",
    roles: [ { role: "dbOwner", db: "mydb" } ]
  }
)

db.auth("userkk","userkk")


 

------------------------------------------------------------------------------------------------------------------

華麗分割

------------------------------------------------------------------------------------------------------------------

現在授權測試:

#先訪問到admin數據庫

 

use admin

db.auth("admin","admin")

 

#切換到 mydb ,在數據庫 mydb 中創建角色
#roles: 創建角色"testRole"在數據庫 "mydb" 中
#privileges: 該角色可查看"find"數據庫"mydb"的所有集合
#db.dropRole("testRole")
use mydb

db.createRole({ 
 role: "testRole",
 privileges: [{ resource: { db: "mydb", collection: "" }, actions: [ "find" ] }],
 roles: []
})

#在admin數據庫生成集合system.roles。查看角色。

 

> use admin
switched to db admin
> 
> show collections
system.indexes
system.roles
system.users
system.version
> 
> db.system.roles.find();
{ "_id" : "mydb.testRole", "role" : "testRole", "db" : "mydb", "privileges" : [ { "resource" : { "db" : "mydb", "collection" : "" }, "actions" : [ "find" ] } ], "roles" : [ ] }
> 

#回到mydb,在數據庫mydb中創建用戶並授予角色"testRole"
#db.dropUser("userkk")

 

 

use mydb

db.createUser(
  {
    user: "userkk",
    pwd: "userkk",
    roles: [ { role: "testRole", db: "mydb" } ]
  }
)

退出mongodb,重新登錄進行操作。發現只能使用find
>exit

 

 

[root@localhost ~]# mongo
MongoDB shell version: 3.0.2
connecting to: test
> use mydb
switched to db mydb
> 
> db.auth("userkk","userkk")
1
> 
> db.tab.find({"id":999})
{ "_id" : ObjectId("554ef5ac1b590330c00c7d02"), "id" : 999 }
> 
> db.tab.insert({"id":1000})
WriteResult({
	"writeError" : {
		"code" : 13,
		"errmsg" : "not authorized on mydb to execute command { insert: \"tab\", documents: [ { _id: ObjectId('554f145cdf782b42499d80e5'), id: 1000.0 } ], ordered: true }"
	}
})
> 

給角色 "testRole" 添加3個 “Privileges”權限: "update", "insert", "remove"。再重新操作。

 

 

use admin

db.auth("admin","admin")

use mydb

#添加Privileges給角色
db.grantPrivilegesToRole("testRole",
 [{ resource: { db: "mydb", collection: "" },actions: [ "update", "insert", "remove" ]}
])


exit #退出mongodb重新登錄


use mydb

db.auth("userkk","userkk")


#增刪數據可以操作了!~
db.tab.insert({"id":1000})
db.tab.find({"id":1000})
db.tab.remove({"id":1000})


#此時admin的角色記錄為:
> db.system.roles.find();
{ "_id" : "mydb.testRole", "role" : "testRole", "db" : "mydb", "privileges" : [ { "resource" : { "db" : "mydb", "collection" : "" }, "actions" : [ "find", "insert", "remove", "update" ] } ], "roles" : [ ] }
> 


#更改角色 roles,把roles值全部更新。同樣Privileges也可以更新替換!~

 

 

use admin

db.auth("admin","admin")

use mydb

db.updateRole("testRole",{ roles:[{ role: "readWrite",db: "mydb"}]},{ w:"majority" })

db.auth("userkk","userkk")

show dbs


 

關於角色,參考官方文檔提取總結如下:

 

角色分類

角色

權限及角色

(本文大小寫可能有些變化,使用時請參考官方文檔)

Database User Roles

read

CollStats,dbHash,dbStats,find,killCursors,listIndexes,listCollections

readWrite

CollStats,ConvertToCapped,CreateCollection,DbHash,DbStats,

DropCollection,CreateIndex,DropIndex,Emptycapped,Find,

Insert,KillCursors,ListIndexes,ListCollections,Remove,

RenameCollectionSameDB,update

Database Administration Roles

dbAdmin

collStats,dbHash,dbStats,find,killCursors,listIndexes,listCollections,

dropCollection 和 createCollection 在 system.profile

dbOwner

角色:readWrite, dbAdmin,userAdmin

userAdmin

ChangeCustomData,ChangePassword,CreateRole,CreateUser,

DropRole,DropUser,GrantRole,RevokeRole,ViewRole,viewUser

Cluster Administration Roles

clusterAdmin

角色:clusterManager, clusterMonitor, hostManager

clusterManager

AddShard,ApplicationMessage,CleanupOrphaned,FlushRouterConfig,

ListShards,RemoveShard,ReplSetConfigure,ReplSetGetStatus,

ReplSetStateChange,Resync,

 

EnableSharding,MoveChunk,SplitChunk,splitVector

clusterMonitor

connPoolStats,cursorInfo,getCmdLineOpts,getLog,getParameter,

getShardMap,hostInfo,inprog,listDatabases,listShards,netstat,

replSetGetStatus,serverStatus,shardingState,top

 

collStats,dbStats,getShardVersion

hostManager

applicationMessage,closeAllDatabases,connPoolSync,cpuProfiler,

diagLogging,flushRouterConfig,fsync,invalidateUserCache,killop,

logRotate,resync,setParameter,shutdown,touch,unlock

Backup and Restoration Roles

backup

提供在admin數據庫mms.backup文檔中insert,update權限

列出所有數據庫:listDatabases

列出所有集合索引:listIndexes

 

對以下提供查詢操作:find

*非系統集合

*系統集合:system.indexes, system.namespaces, system.js

*集合:admin.system.users 和 admin.system.roles

restore

非系統集合、system.js,admin.system.users 和 admin.system.roles 及2.6 版本的system.users提供以下權限:

collMod,createCollection,createIndex,dropCollection,insert

 

列出所有數據庫:listDatabases

system.users :find,remove,update

All-Database Roles

readAnyDatabase

提供所有數據庫中只讀權限:read

列出集群所有數據庫:listDatabases

readWriteAnyDatabase

提供所有數據庫讀寫權限:readWrite

列出集群所有數據庫:listDatabases

userAdminAnyDatabase

提供所有用戶數據管理權限:userAdmin

Cluster:authSchemaUpgrade,invalidateUserCache,listDatabases

admin.system.users和admin.system.roles:

collStats,dbHash,dbStats,find,killCursors,planCacheRead

createIndex,dropIndex

dbAdminAnyDatabase

提供所有數據庫管理員權限:dbAdmin

列出集群所有數據庫:listDatabases

Superuser Roles

root

角色:dbOwner,userAdmin,userAdminAnyDatabase

readWriteAnyDatabase, dbAdminAnyDatabase,

userAdminAnyDatabase,clusterAdmin

Internal Role

__system

集群中對任何數據庫采取任何操作

 

  1. 上一頁:
  2. 下一頁:
Copyright © 程式師世界 All Rights Reserved