MongoDB 4.0檢視,更新和回收角色許可權步驟
檢視角色許可權資訊:
use admin
> db.system.roles.find().pretty()
{
"_id" : "admin.custom_role_test",
"role" : "custom_role_test",
"db" : "admin",
"privileges" : [
{
"resource" : {
"db" : "test",
"collection" : " "
},
"actions" : [
"createCollection",
"createIndex",
"find",
"insert",
"update"
]
}
],
"roles" : [
{
"role" : "read",
"db" : "test"
}
]
}
{
"_id" : "test.custom_role_test",
"role" : "custom_role_test",
"db" : "test",
"privileges" : [
{
"resource" : {
"db" : "test",
"collection" : " "
},
"actions" : [
"createCollection",
"createIndex",
"find",
"insert",
"update"
]
}
],
"roles" : [
{
"role" : "read",
"db" : "test"
}
]
}
檢視使用者:
PRIMARY> show users
{
"_id" : "admin.test_rw",
"userId" : UUID("7cd05387-fb0c-49b3-9c04-49b8444e8d6f"),
"user" : "test_rw",
"db" : "admin",
"roles" : [
{
"role" : "custom_role_test",
"db" : "test"
}
],
"mechanisms" : [
"SCRAM-SHA-1",
"SCRAM-SHA-256"
]
}
{
"_id" : "admin.root",
"userId" : UUID("9416402a-d029-4add-8d0b-66b65b9f5a94"),
"user" : "root",
"db" : "admin",
"roles" : [
{
"role" : "root",
"db" : "admin"
}
],
"mechanisms" : [
"SCRAM-SHA-1",
"SCRAM-SHA-256"
]
}
檢視使用者資訊:
PRIMARY> db.runCommand({usersInfo:"test_rw"})
{
"users" : [
{
"_id" : "admin.test_rw",
"userId" : UUID("7cd05387-fb0c-49b3-9c04-49b8444e8d6f"),
"user" : "test_rw",
"db" : "admin",
"roles" : [
{
"role" : "custom_role_customer",
"db" : "customer"
},
{
"role" : "custom_role_test",
"db" : "test"
}
],
"mechanisms" : [
"SCRAM-SHA-1",
"SCRAM-SHA-256"
]
}
],
"ok" : 1,
"$clusterTime" : {
"clusterTime" : Timestamp(1654076841, 1),
"signature" : {
"hash" : BinData(0,"8JWM/9Xy+h9L/7L/6vIMsQUz8ug="),
"keyId" : NumberLong("7066856411933704193")
}
},
"operationTime" : Timestamp(1654076841, 1)
}
更新角色許可權資訊:
語法:
db.updateRole(
"<rolename>",
{
privileges:
[
{ resource: { <resource> }, actions: [ "<action>", ... ] },
...
],
roles:
[
{ role: "<role>", db: "<database>" } | "<role>",
...
]
},
{ <writeConcern> }
)
例子(修改許可權資訊,加入remove許可權):
use admin
db.updateRole(
"custom_role_test",
{
privileges:
[
{
resource: { db:"test", collection:" " },
actions: [ "insert", "update", "find" ,"remove","createCollection", "createIndex"]
}
],
roles:
[
{
role: "read",
db: "test"
}
]
},
{ w:"majority" }
);
use test
db.updateRole(
"custom_role_test",
{
privileges:
[
{
resource: { db:"test", collection:" " },
actions: [ "insert", "update", "find","remove" ,"createCollection", "createIndex"]
}
],
roles:
[
{
role: "read",
db: "test"
}
]
},
{ w:"majority" }
);
回收角色許可權步驟:
語法:
db.revokeRolesFromUser( "<username>", [ <roles> ], { <writeConcern> } )
例子:
use test
db.revokeRolesFromUser( "test",
[ { role: "read", db: "test" }, "readWrite" ],
{ w: "majority" }
)
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/15498/viewspace-2898625/,如需轉載,請註明出處,否則將追究法律責任。
相關文章
- MongoDB 學習筆記
- SAP UI5 應用的主-從-從(Master-Detail-Detail)佈局模式的實現步驟
- 維護伺服器的五大步驟
- 記一次Tomcat卡死在 Deploying web application 步驟的問題
- VIM在CentOS7上的無root許可權安裝
- spss迴歸分析的基本步驟 spss線性迴歸怎麼做
- 成為Java全棧工程師的步驟
- MongoDB 新手入門 - CRUD
- LR.Net低程式碼開發平臺 快速設計許可權管理模組
- 重啟資料庫叢集伺服器( 主庫伺服器/備庫伺服器 )步驟
- gcluster/gnode 許可權設定為全權 777,叢集啟動失敗;
- Go微服務框架go-kratos實戰02:proto 程式碼生成和編碼實現步驟
- ipv4和ipv6無網路訪問許可權 ipv4連線正常ipv6無網路訪問許可權
- 談談關於設計資料管理/治理角色的問題
- 【資料庫資料恢復】MongoDB資料庫檔案損壞的資料恢復案例