MongoDB3.x中添加用户和权限控制
现在需要创建一个帐号,该账号需要有grant权限,即:账号管理的授权权限。注意一点,帐号是跟着库走的,所以在指定库里授权,必须也在指定库里验证(auth)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
|
1.在admin库中,添加用户并授权 use admin; db.createUser( { user : "boot_admin" , pwd: "boot_admin" , roles: [ { role: "readWrite" , db: "admin" } ] } ); 2.在admin库中验证 use admin; db.auth( 'boot_admin' , 'boot_admin' ) |
说明:
user:用户名
pwd:密码
roles:指定用户的角色,可以用一个空数组给新用户设定空角色;在roles字段,可以指定内置角色和用户定义的角色。role里的角色可以选:
1
2
3
4
5
6
7
8
9
|
Built- In Roles(内置角色): 1. 数据库用户角色: read 、readWrite; 2. 数据库管理角色:dbAdmin、dbOwner、userAdmin; 3. 集群管理角色:clusterAdmin、clusterManager、clusterMonitor、hostManager; 4. 备份恢复角色:backup、restore; 5. 所有数据库角色:readAnyDatabase、readWriteAnyDatabase、userAdminAnyDatabase、dbAdminAnyDatabase 6. 超级用户角色:root // 这里还有几个角色间接或直接提供了系统超级用户的访问(dbOwner 、userAdmin、userAdminAnyDatabase) 7. 内部角色:__system |
具体角色:
1
2
3
4
5
6
7
8
9
10
|
Read :允许用户读取指定数据库 readWrite:允许用户读写指定数据库 dbAdmin:允许用户在指定数据库中执行管理函数,如索引创建、删除,查看统计或访问system.profile userAdmin:允许用户向system.users集合写入,可以找指定数据库里创建、删除和管理用户 clusterAdmin:只在admin数据库中可用,赋予用户所有分片和复制集相关函数的管理权限。 readAnyDatabase:只在admin数据库中可用,赋予用户所有数据库的读权限 readWriteAnyDatabase:只在admin数据库中可用,赋予用户所有数据库的读写权限 userAdminAnyDatabase:只在admin数据库中可用,赋予用户所有数据库的userAdmin权限 dbAdminAnyDatabase:只在admin数据库中可用,赋予用户所有数据库的dbAdmin权限。 root:只在admin数据库中可用。超级账号,超级权限 |
eg:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
> use admin switched to db admin > db.createUser( ... { ... user : "dba" , ... pwd: "dba" , ... roles: [ { role: "userAdminAnyDatabase" , db: "admin" } ] ... } ... ) Successfully added user : { "user" : "dba" , "roles" : [ { "role" : "userAdminAnyDatabase" , "db" : "admin" } ] } |
刚建立了 userAdminAnyDatabase 角色,用来管理用户,可以通过这个角色来创建、删除用户。验证:需要开启auth参数。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
|
mongo --port=27020 MongoDB shell version: 3.0.4 connecting to : 127.0.0.1:27020/test > show dbs; ####没有验证,导致没权限。 2015-06-29T10:02:16.634-0400 E QUERY Error: listDatabases failed:{ "ok" : 0, "errmsg" : "not authorized on admin to execute command { listDatabases: 1.0 }" , "code" : 13 } at Error () at Mongo.getDBs (src/mongo/shell/mongo.js:47:15) at shellHelper.show (src/mongo/shell/utils.js:630:33) at shellHelper (src/mongo/shell/utils.js:524:36) at (shellhelp2):1:1 at src/mongo/shell/mongo.js:47 > use admin #验证,因为在admin下面添加的帐号,所以要到admin下面验证。 switched to db admin > db.auth( 'dba' , 'dba' ) 1 > show dbs; admin 0.078GB local 0.078GB > use test #在test库里创建帐号 switched to db test > db.createUser( ... { ... user : "zjyr" , ... pwd: "zjyr" , ... roles: [ ... { role: "read" , db: "test" } #只读帐号 ... ] ... } ... ) Successfully added user : { "user" : "zjyr" , "roles" : [ { "role" : "read" , "db" : "test" } ] } > db.createUser( ... { ... user : "zjy" , ... pwd: "zjy" , ... roles: [ ... { role: "readWrite" , db: "test" } #读写帐号 ... ] ... } ... ) Successfully added user : { "user" : "zjy" , "roles" : [ { "role" : "readWrite" , #读写账号 "db" : "test" } ] } > show users; #查看当前库下的用户 { "_id" : "test.zjyr" , "user" : "zjyr" , "db" : "test" , "roles" : [ { "role" : "read" , "db" : "test" } ] } { "_id" : "test.zjy" , "user" : "zjy" , "db" : "test" , "roles" : [ { "role" : "readWrite" , "db" : "test" } ] }</anonymous> |
上面创建了2个帐号,现在验证下:验证前提需要一个集合
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
|
> db.abc. insert ({ "a" :1, "b" :2}) #插入失败,没有权限,userAdminAnyDatabase 权限只是针对用户管理的,对其他是没有权限的。 WriteResult({ "writeError" : { "code" : 13, "errmsg" : "not authorized on test to execute command { insert: \"abc\", documents: [ { _id: ObjectId('55915185d629831d887ce2cb'), a: 1.0, b: 2.0 } ], ordered: true }" } }) > bye root@zhoujinyi:/usr/ local /mongo4# mongo --port=27020 MongoDB shell version: 3.0.4 connecting to : 127.0.0.1:27020/test > use test switched to db test > db.auth( 'zjy' , 'zjy' ) #用创建的readWrite帐号进行写入 1 > db.abc. insert ({ "a" :1, "b" :2}) WriteResult({ "nInserted" : 1 }) > db.abc. insert ({ "a" :11, "b" :22}) WriteResult({ "nInserted" : 1 }) > db.abc. insert ({ "a" :111, "b" :222}) WriteResult({ "nInserted" : 1 }) > db.abc.find() { "_id" : ObjectId( "559151a1b78649ebd8316853" ), "a" : 1, "b" : 2 } { "_id" : ObjectId( "559151cab78649ebd8316854" ), "a" : 11, "b" : 22 } { "_id" : ObjectId( "559151ceb78649ebd8316855" ), "a" : 111, "b" : 222 } > db.auth( 'zjyr' , 'zjyr' ) #切换到只有 read 权限的帐号 1 > db.abc. insert ({ "a" :1111, "b" :2222}) #不能写入 WriteResult({ "writeError" : { "code" : 13, "errmsg" : "not authorized on test to execute command { insert: \"abc\", documents: [ { _id: ObjectId('559151ebb78649ebd8316856'), a: 1111.0, b: 2222.0 } ], ordered: true }" } }) > db.abc.find() #可以查看 { "_id" : ObjectId( "559151a1b78649ebd8316853" ), "a" : 1, "b" : 2 } { "_id" : ObjectId( "559151cab78649ebd8316854" ), "a" : 11, "b" : 22 } { "_id" : ObjectId( "559151ceb78649ebd8316855" ), "a" : 111, "b" : 222 } |
有没有一个超级权限?不仅可以授权,而且也可以对集合进行任意操作?答案是肯定的,只是不建议使用。那就是role角色设置成root。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
|
> db.auth( 'dba' , 'dba' ) 1 > db.createUser( ... { ... user : "zhoujinyi" , ... pwd: "zhoujinyi" , ... roles: [ ... { role: "root" , db: "admin" } #超级root帐号 ... ] ... } ... ) Successfully added user : { "user" : "zhoujinyi" , "roles" : [ { "role" : "root" , "db" : "admin" } ] } > > show users; #查看当前库下的用户 { "_id" : "admin.dba" , "user" : "dba" , "db" : "admin" , "roles" : [ { "role" : "userAdminAnyDatabase" , "db" : "admin" } ] } { "_id" : "admin.zhoujinyi" , "user" : "zhoujinyi" , "db" : "admin" , "roles" : [ { "role" : "root" , "db" : "admin" } ] } > use admin switched to db admin > db.auth( 'zhoujinyi' , 'zhoujinyi' ) 1 > use test switched to db test > db.abc. insert ({ "a" :1, "b" :2}) WriteResult({ "nInserted" : 1 }) > db.abc. insert ({ "a" :1111, "b" :2222}) #权限都有 WriteResult({ "nInserted" : 1 }) > db.abc.find() { "_id" : ObjectId( "5591539bb78649ebd8316857" ), "a" : 1, "b" : 2 } { "_id" : ObjectId( "559153a0b78649ebd8316858" ), "a" : 1111, "b" : 2222 } > db.abc.remove({}) WriteResult({ "nRemoved" : 2 }) |
因为帐号都是在当前需要授权的数据库下授权的,那要是不在当前数据库下会怎么样?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
|
> db admin > db.createUser( ... { ... user : "dxy" , ... pwd: "dxy" , ... roles: [ ... { role: "readWrite" , db: "test" }, #在当前库下创建其他库的帐号,在admin库下创建test、abc库的帐号 ... { role: "readWrite" , db: "abc" } ... ] ... } ... ) Successfully added user : { "user" : "dxy" , "roles" : [ { "role" : "readWrite" , "db" : "test" }, { "role" : "readWrite" , "db" : "abc" } ] } > > show users; { "_id" : "admin.dba" , "user" : "dba" , "db" : "admin" , "roles" : [ { "role" : "userAdminAnyDatabase" , "db" : "admin" } ] } { "_id" : "admin.zhoujinyi" , "user" : "zhoujinyi" , "db" : "admin" , "roles" : [ { "role" : "root" , "db" : "admin" } ] } { "_id" : "admin.dxy" , "user" : "dxy" , "db" : "admin" , "roles" : [ { "role" : "readWrite" , "db" : "test" }, { "role" : "readWrite" , "db" : "abc" } ] } > use test switched to db test > db.auth( 'dxy' , 'dxy' ) #在admin下创建的帐号,不能直接在其他库验证, Error: 18 Authentication failed. 0 > use admin switched to db admin #只能在帐号创建库下认证,再去其他库进行操作。 > db.auth( 'dxy' , 'dxy' ) 1 > use test switched to db test > db.abc. insert ({ "a" :1111, "b" :2222}) WriteResult({ "nInserted" : 1 }) > use abc switched to db abc > db.abc. insert ({ "a" :1111, "b" :2222}) WriteResult({ "nInserted" : 1 }) |
上面更加进一步说明数据库帐号是跟着数据库来走的,哪里创建哪里认证。
创建了这么多帐号,怎么查看所有帐号?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
|
> use admin switched to db admin > db.auth( 'dba' , 'dba' ) 1 > db.system.users.find().pretty() { "_id" : "admin.dba" , "user" : "dba" , "db" : "admin" , "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "KfDUzCOIUo7WVjFr64ZOcQ==" , "storedKey" : "t4sPsKG2dXnZztVYj5EgdUzT9sc=" , "serverKey" : "2vCGiq9NIc1zKqeEL6VvO4rP26A=" } }, "roles" : [ { "role" : "userAdminAnyDatabase" , "db" : "admin" } ] } { "_id" : "test.zjyr" , "user" : "zjyr" , "db" : "test" , "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "h1gOW3J7wzJuTqgmmQgJKQ==" , "storedKey" : "7lkoANdxM2py0qiDBzFaZYPp1cM=" , "serverKey" : "Qyu6IRNyaKLUvqJ2CAa/tQYY36c=" } }, "roles" : [ { "role" : "read" , "db" : "test" } ] } { "_id" : "test.zjy" , "user" : "zjy" , "db" : "test" , "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "afwaKuTYPWwbDBduQ4Hm7g==" , "storedKey" : "ebb2LYLn4hiOVlZqgrAKBdStfn8=" , "serverKey" : "LG2qWwuuV+FNMmr9lWs+Rb3DIhQ=" } }, "roles" : [ { "role" : "readWrite" , "db" : "test" } ] } { "_id" : "admin.zhoujinyi" , "user" : "zhoujinyi" , "db" : "admin" , "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "pE2cSOYtBOYevk8tqrwbSQ==" , "storedKey" : "TwMxdnlB5Eiaqg4tNh9ByNuUp9A=" , "serverKey" : "Mofr9ohVlFfR6/md4LMRkOhXouc=" } }, "roles" : [ { "role" : "root" , "db" : "admin" } ] } { "_id" : "admin.dxy" , "user" : "dxy" , "db" : "admin" , "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "XD6smcWX4tdg/ZJPoLxxRg==" , "storedKey" : "F4uiayykHDp/r9krAKZjdr+gqjM=" , "serverKey" : "Kf51IU9J3RIrB8CFn5Z5hEKMSkw=" } }, "roles" : [ { "role" : "readWrite" , "db" : "test" }, { "role" : "readWrite" , "db" : "abc" } ] } > db.system.users.find(). count () 5 |
备份还原使用那个角色的帐号?之前创建的帐号zjy:test库读写权限;zjyr:test库读权限
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
|
root@zhoujinyi:~# mongodump --port=27020 -uzjyr -pzjyr --db=test -o backup #只要读权限就可以备份 2015-06-29T11:20:04.864-0400 writing test.abc to backup/test/abc.bson 2015-06-29T11:20:04.865-0400 writing test.abc metadata to backup/test/abc.metadata.json 2015-06-29T11:20:04.866-0400 done dumping test.abc 2015-06-29T11:20:04.867-0400 writing test.system.indexes to backup/test/system.indexes.bson root@zhoujinyi:~# mongorestore --port=27020 -uzjy -pzjy --db=test backup/test/ #读写权限可以进行还原 2015-06-29T11:20:26.607-0400 building a list of collections to restore from backup/test/ dir 2015-06-29T11:20:26.609-0400 reading metadata file from backup/test/abc.metadata.json 2015-06-29T11:20:26.609-0400 restoring test.abc from file backup/test/abc.bson 2015-06-29T11:20:26.611-0400 error: E11000 duplicate key error index : test.abc.$_id_ dup key : { : ObjectId( '559154efb78649ebd831685a' ) } 2015-06-29T11:20:26.611-0400 restoring indexes for collection test.abc from metadata 2015-06-29T11:20:26.612-0400 finished restoring test.abc 2015-06-29T11:20:26.612-0400 done |