You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/core/security-encryption-at-rest.txt
+18-1Lines changed: 18 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,24 @@ Standard in Cipher Block Chaining mode) via OpenSSL. AES-256 uses a
47
47
symmetric key; i.e. the same key to encrypt and decrypt text. MongoDB
48
48
Enterprise for Linux also supports authenticated encryption
49
49
``AES256-GCM`` (or 256-bit Advanced Encryption Standard in
50
-
Galois/Counter Mode). FIPS mode encryption is also available.
50
+
Galois/Counter Mode).
51
+
52
+
The Encrypted Storage Engine uses the certified cryptography provider
53
+
of the underlying operating system to perform cryptographic operations.
54
+
For example, a MongoDB installation on a Linux operating system
55
+
uses the OpenSSL ``libcrypto`` FIPS-140 module.
56
+
57
+
To run MongoDB in a FIPS-compliant mode:
58
+
59
+
#. Configure the operating system to run in FIPS-enforcing mode.
60
+
61
+
#. Configure MongoDB to enable the :setting:`net.tls.FIPSMode` setting.
62
+
63
+
#. Restart the ``mongod`` or ``mongos``.
64
+
65
+
#. Check the server log file to confirm that FIPS mode is enabled. If FIPS mode is enabled, the message ``FIPS 140-2 mode activated`` appears in the log file.
66
+
67
+
For more information, see :ref:`configure-mdb-for-fips`.
0 commit comments