Skip to content

Commit 03c2e03

Browse files
authored
DOCSP-13383 certificate verbiage update (#207)
* DOCSP-13383 certificate verbiage update * Rewrapping lines 200-205 * Address Jason's comments #1
1 parent 4417ece commit 03c2e03

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

source/core/security-transport-encryption.txt

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -198,13 +198,14 @@ To use TLS/SSL with MongoDB , you must have the TLS/SSL certificates as
198198
:file:`PEM` files, which are concatenated certificate containers.
199199

200200
MongoDB can use any valid TLS/SSL certificate issued by a certificate
201-
authority or a self-signed certificate. If you use a self-signed
202-
certificate, although the communications channel will be encrypted,
203-
there will be *no* validation of server identity. Although such a
204-
situation will prevent eavesdropping on the connection, it leaves you
205-
vulnerable to a man-in-the-middle attack. Using a certificate signed by
206-
a trusted certificate authority will permit MongoDB drivers to verify
207-
the server's identity.
201+
authority or a self-signed certificate. For production use, your MongoDB
202+
deployment should use valid certificates generated and signed by the
203+
same certificate authority. You can generate and maintain an independent
204+
certificate authority, or use certificates generated by a third-party
205+
TLS/SSL vendor.
206+
207+
Using a certificate signed by a trusted certificate authority allows
208+
MongoDB drivers to verify the server's identity.
208209

209210
For example, see :doc:`/tutorial/configure-ssl-clients`.
210211

0 commit comments

Comments
 (0)