Skip to content

Commit 71819d2

Browse files
authored
Docsp-13383 tls self signed certificates verbaige update (#327)
* DOCSP-13383 certificate verbiage update * Rewrapping lines 200-205 * Address Jason's comments #1
1 parent a95edf9 commit 71819d2

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

source/core/security-transport-encryption.txt

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,13 +35,14 @@ To use TLS/SSL with MongoDB , you must have the TLS/SSL certificates as
3535
:file:`PEM` files, which are concatenated certificate containers.
3636

3737
MongoDB can use any valid TLS/SSL certificate issued by a certificate
38-
authority or a self-signed certificate. If you use a self-signed
39-
certificate, although the communications channel will be encrypted,
40-
there will be *no* validation of server identity. Although such a
41-
situation will prevent eavesdropping on the connection, it leaves you
42-
vulnerable to a man-in-the-middle attack. Using a certificate signed by
43-
a trusted certificate authority will permit MongoDB drivers to verify
44-
the server's identity.
38+
authority or a self-signed certificate. For production use, your MongoDB
39+
deployment should use valid certificates generated and signed by the
40+
same certificate authority. You can generate and maintain an independent
41+
certificate authority, or use certificates generated by a third-party
42+
TLS/SSL vendor.
43+
44+
Using a certificate signed by a trusted certificate authority allows
45+
MongoDB drivers to verify the server's identity.
4546

4647
For example, see :doc:`/tutorial/configure-ssl-clients`.
4748

0 commit comments

Comments
 (0)