@@ -52,8 +52,6 @@ stored in the key manager.
5252
5353MongoDB Enterprise supports secure transfer of keys with Key Management
5454Interoperability Protocol (KMIP) compliant key management appliances.
55- Any appliance vendor that provides support for KMIP is expected
56- to be compatible.
5755
5856.. include:: /includes/partners-security.rst
5957
@@ -68,6 +66,8 @@ Prerequisites
6866
6967- Your key manager must support the KMIP communication protocol.
7068
69+ .. include:: /includes/reference/fact-kmip-version.rst
70+
7171- To authenticate MongoDB to a KMIP server, you must have a valid
7272 certificate issued by the key management appliance.
7373
@@ -80,34 +80,32 @@ Prerequisites
8080Encrypt Using a New Key
8181~~~~~~~~~~~~~~~~~~~~~~~
8282
83- To create a new key, connect :binary:`~bin.mongod` to the key manager by starting
84- :binary:`~bin.mongod` with the following options :
83+ To create a new key when you connect to the key manager, use the
84+ following options to start ``mongod`` :
8585
8686- :option:`--enableEncryption <mongod --enableEncryption>`
8787- :option:`--kmipServerName <mongod --kmipServerName>`
8888- :option:`--kmipPort <mongod --kmipPort>`
8989- :option:`--kmipServerCAFile <mongod --kmipServerCAFile>`
9090- :option:`--kmipClientCertificateFile <mongod --kmipClientCertificateFile>`
9191
92+ .. include:: /includes/reference/fact-add-v1-flag.rst
93+
9294.. include:: /includes/extracts/default-bind-ip-security-additional-command-line.rst
9395
94- The following operation creates a new master key in your key manager which
95- :binary:`~bin. mongod` uses to encrypt the keys :binary:`~bin. mongod` generates
96- for each database.
96+ The following operation creates a new master key in your key manager.
97+ `` mongod`` uses the master key to encrypt the keys that `` mongod``
98+ generates for each database.
9799
98100.. code-block:: bash
99101
100- mongod --enableEncryption --kmipServerName <KMIP Server HostName> \
101- --kmipPort <KMIP server port> --kmipServerCAFile ca.pem \
102- --kmipClientCertificateFile client.pem
102+ mongod --enableEncryption \
103+ --kmipServerName <KMIP Server HostName> \
104+ --kmipPort <KMIP server port> \
105+ --kmipServerCAFile ca.pem \
106+ --kmipClientCertificateFile client.pem
103107
104- When connecting to the KMIP server, the :binary:`~bin.mongod` verifies
105- that the specified :option:`--kmipServerName <mongod --kmipServerName>`
106- matches the Subject Alternative Name ``SAN`` (or, if ``SAN`` is not
107- present, the Common Name ``CN``) in the certificate presented by the
108- KMIP server. [#san]_ If ``SAN`` is present, :binary:`~bin.mongod` does
109- not match against the ``CN``. If the hostname does not match the
110- ``SAN`` (or ``CN``), the :binary:`~bin.mongod` will fail to connect.
108+ .. include:: /includes/reference/fact-connection-check.rst
111109
112110To verify that the key creation and usage was successful, check the log
113111file. If successful, the process will log the following messages:
@@ -126,9 +124,9 @@ file. If successful, the process will log the following messages:
126124Encrypt Using an Existing Key
127125~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
128126
129- You can use an existing master key your KMIP server created and
130- manages. To use an existing key, connect :binary:`~bin.mongod` to the
131- key manager by starting :binary:`~bin. mongod` with the following options :
127+ You can use an existing master key that your KMIP server already
128+ manages. To use an existing key, use these options when you start
129+ ``mongod`` to connect `` mongod`` to the key manager :
132130
133131- :option:`--enableEncryption <mongod --enableEncryption>`
134132- :option:`--kmipServerName <mongod --kmipServerName>`
@@ -137,31 +135,25 @@ key manager by starting :binary:`~bin.mongod` with the following options:
137135- :option:`--kmipClientCertificateFile <mongod --kmipClientCertificateFile>`
138136- :option:`--kmipKeyIdentifier <mongod --kmipKeyIdentifier>`
139137
140- .. include:: /includes/extracts/default-bind-ip-security-additional-command-line .rst
138+ .. include:: /includes/reference/fact-add-v1-flag .rst
141139
140+ .. include:: /includes/extracts/default-bind-ip-security-additional-command-line.rst
142141
143142.. code-block:: bash
144143
145- mongod --enableEncryption --kmipServerName <KMIP Server HostName> \
146- --kmipPort <KMIP server port> --kmipServerCAFile ca.pem \
147- --kmipClientCertificateFile client.pem --kmipKeyIdentifier <UID>
144+ mongod --enableEncryption \
145+ --kmipServerName <KMIP Server HostName> \
146+ --kmipPort <KMIP server port> \
147+ --kmipServerCAFile ca.pem \
148+ --kmipClientCertificateFile client.pem \
149+ --kmipKeyIdentifier <UID>
148150
149- When connecting to the KMIP server, the :binary:`~bin.mongod` verifies
150- that the specified :option:`--kmipServerName <mongod --kmipServerName>`
151- matches the Subject Alternative Name ``SAN`` (or, if ``SAN`` is not
152- present, the Common Name ``CN``) in the certificate presented by the
153- KMIP server. [#san]_ If ``SAN`` is present, :binary:`~bin.mongod` does not
154- match against the ``CN``. If the hostname does not match the ``SAN``
155- (or ``CN``), the :binary:`~bin.mongod` will fail to connect.
151+ .. include:: /includes/reference/fact-connection-check.rst
156152
157153.. seealso::
158154
159155 :ref:`encryption-key-management-options`
160156
161- .. [#san]
162-
163- .. include:: /includes/extracts/4.2-changes-SAN-matching.rst
164-
165157.. _encrypt-local-key-mgmt:
166158
167159Local Key Management
0 commit comments