db.createUser()
On this page本页内容
Definition定义
db.createUser(user, writeConcern)
-
Creates a new user for the database on which the method is run.为运行该方法的数据库创建一个新用户。如果数据库中已经存在用户,则db.createUser()
returns a duplicate user error if the user already exists on the database.db.createUser()
返回一个重复的用户错误。Importantmongosh Method
This page documents a
mongosh
method. This is not the documentation for database commands or language-specific drivers, such as Node.js.For the database command, see the
createUser
command.For MongoDB API drivers, refer to the language-specific MongoDB driver documentation.
For the legacy对于遗留的mongoshell文档,请参阅相应MongoDB Server版本的文档:mongo
shell documentation, refer to the documentation for the corresponding MongoDB Server release:Thedb.createUser()
method has the following syntax:db.createUser()
方法具有以下语法:Field字段Type类型Description描述user
document The document with authentication and access information about the user to create.具有要创建的用户的身份验证和访问信息的文档。writeConcern
document Optional.可选的。The level of write concern for the operation. See Write Concern Specification.操作的写入关注级别。请参阅写入关注规范。Theuser
document defines the user and has the following form:user
文档定义用户,并具有以下形式:TipStarting in version 4.2 of the从mongoshell的4.2版本开始,您可以将mongo
shell, you can use thepasswordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. However, you can still specify the password directly as you would with earlier versions of themongo
shell.passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。但是,您仍然可以像使用早期版本的mongoshell一样直接指定密码。{
user: "<name>",
pwd: passwordPrompt(), // Or "<cleartext password>"
customData: { <any information> },
roles: [
{ role: "<role>", db: "<database>" } | "<role>",
...
],
authenticationRestrictions: [
{
clientSource: ["<IP>" | "<CIDR range>", ...],
serverAddress: ["<IP>" | "<CIDR range>", ...]
},
...
],
mechanisms: [ "<SCRAM-SHA-1|SCRAM-SHA-256>", ... ],
passwordDigestor: "<server|client>"
}Theuser
document has the following fields:user
文档包含以下字段:Field字段Type类型Description描述user
string The name of the new user.新用户的名称。pwd
string The user's password.用户的密码。The如果您在pwd
field is not required if you rundb.createUser()
on the$external
database to create users who have credentials stored externally to MongoDB.$external
数据库上运行db.createUser()
来创建具有存储在MongoDB外部的凭据的用户,则不需要pwd
字段。
The value can be either:该值可以是:the user's password in cleartext string, or明文字符串中的用户密码,或passwordPrompt()
to prompt for the user's password.以提示输入用户的密码。
TipStarting in version 4.2 of the从mongo
shell, you can use thepasswordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call.mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。However, you can still specify the password directly as you would with earlier versions of the但是,您仍然可以像使用早期版本的mongo
shell.mongo
shell一样直接指定密码。customData
document Optional.可选的。Any arbitrary information. This field can be used to store any data an admin wishes to associate with this particular user.任何任意信息。该字段可用于存储管理员希望与该特定用户关联的任何数据。For example, this could be the user's full name or employee id.例如,这可能是用户的全名或员工id。roles
array The roles granted to the user. Can specify an empty array授予用户的角色。可以指定一个空数组[]
to create users without roles.[]
来创建没有角色的用户。authenticationRestrictions
array Optional.可选的。The authentication restrictions the server enforces on the created user.服务器对创建的用户强制执行的身份验证限制。Specifies a list of IP addresses and CIDR ranges from which the user is allowed to connect to the server or from which the server can accept users.指定允许用户连接到服务器或服务器可以接受用户的IP地址和CIDR范围的列表。mechanisms
array Optional.可选的。Specify the specific SCRAM mechanism or mechanisms for creating SCRAM user credentials.指定用于创建SCRAM用户凭据的特定SCRAM机制。If如果指定了authenticationMechanisms
is specified, you can only specify a subset of theauthenticationMechanisms
.authenticationMechanisms
,则只能指定authenticationMechanisms
的子集。
Valid values are:有效值为:"SCRAM-SHA-1"
Uses the使用SHA-1
hashing function.SHA-1
哈希函数。
"SCRAM-SHA-256"
Uses the使用SHA-256
hashing function.SHA-256
哈希函数。Requires passwordDigestor to be要求密码Digestor为server
.server
。
The default is both默认值为SCRAM-SHA-1
andSCRAM-SHA-256
.SCRAM-SHA-1
和SCRAM-SHA-256
。passwordDigestor
string Optional.可选的。Indicates whether the server or the client digests the password.指示服务器还是客户端对密码进行摘要处理。
Available values are:可用值为:"server"
(Default)The server receives undigested password from the client and digests the password.服务器从客户端接收未消化的密码,并对密码进行消化。
"client"
(Not compatible withSCRAM-SHA-256
)The client digests the password and passes the digested password to the server.客户端对密码进行摘要处理,并将摘要处理后的密码传递给服务器。
Roles角色
In the 在roles
field, you can specify both built-in roles and user-defined roles.roles
字段中,可以指定内置角色和用户定义的角色。
To specify a role that exists in the same database where 要指定运行db.createUser()
runs, you can either specify the role with the name of the role:db.createUser()
的同一数据库中存在的角色,可以使用角色名称指定该角色:
"readWrite"
Or you can specify the role with a document, as in:或者,您可以使用文档指定角色,如中所示:
{ role: "<role>", db: "<database>" }
To specify a role that exists in a different database, specify the role with a document.若要指定其他数据库中存在的角色,请使用文档指定该角色。
Authentication Restrictions身份验证限制
The authenticationRestrictions
document can contain only the following fields. authenticationRestrictions
文档只能包含以下字段。The server throws an error if the 如果authenticationRestrictions
document contains an unrecognized field:authenticationRestrictions
文档包含无法识别的字段,则服务器将引发错误:
clientSource | ||
serverAddress |
If a user inherits multiple roles with incompatible authentication restrictions, that user becomes unusable.如果用户继承了多个具有不兼容身份验证限制的角色,则该用户将变得不可用。
For example, if a user inherits one role in which the 例如,如果用户继承了一个角色,其中clientSource
field is ["198.51.100.0"]
and another role in which the clientSource
field is ["203.0.113.0"]
the server is unable to authenticate the user.clientSource
字段为["198.51.100.0"]
,而另一个角色的clientSource
字段则为["203.0.113.0"]
,则服务器无法对用户进行身份验证。
For more information on authentication in MongoDB, see Authentication.有关MongoDB中身份验证的更多信息,请参阅身份验证。
The db.createUser()
method wraps the createUser
command.db.createUser()
方法包装createUser
命令。
Behavior行为
User ID用户ID
Starting in version 4.0.9, MongoDB automatically assigns a unique 从4.0.9版本开始,MongoDB会在创建时自动为用户分配一个唯一的userId
to the user upon creation.userId
。
Replica set副本集
If run on a replica set, 如果在副本集上运行,db.createUser()
is executed using "majority"
write concern by default.db.createUser()
在默认情况下使用"majority"
写入关注执行。
Encryption加密
By default, 默认情况下,db.createUser()
sends all specified data to the MongoDB instance in cleartext, even if using passwordPrompt()
. db.createUser()
以明文形式将所有指定的数据发送到MongoDB实例,即使使用passwordPrompt()
也是如此。Use TLS transport encryption to protect communications between clients and the server, including the password sent by 使用TLS传输加密来保护客户端和服务器之间的通信,包括db.createUser()
. db.createUser()
发送的密码。For instructions on enabling TLS transport encryption, see Configure 有关启用TLS传输加密的说明,请参阅为TLS/SSL配置mongod
and mongos
for TLS/SSL.mongod
和mongos
。
MongoDB does not store the password in cleartext. MongoDB不以明文形式存储密码。The password is only vulnerable in transit between the client and the server, and only if TLS transport encryption is not enabled.只有在客户端和服务器之间的传输过程中,并且只有在未启用TLS传输加密的情况下,密码才易受攻击。
External Credentials外部凭据
Users created on the 在$external
database should have credentials stored externally to MongoDB, as, for example, with MongoDB Enterprise installations that use Kerberos.$external
数据库上创建的用户应该具有存储在MongoDB外部的凭据,例如,使用Kerberos的MongoDB Enterprise安装。
To use Client Sessions and Causal Consistency Guarantees with 要对$external
authentication users (Kerberos, LDAP, or x.509 users), usernames cannot be greater than 10k bytes.$external
身份验证用户(Kerberos、LDAP或x.509用户)使用客户端会话和因果一致性保证,用户名不能大于10k字节。
local
Database数据库
You cannot create users on the local database.无法在本地数据库上创建用户。
Required Access所需访问权限
To create a new user in a database, you must have the要在数据库中创建新用户,必须对该数据库资源执行createUser
action on that database resource.createUser
操作。To grant roles to a user, you must have the要向用户授予角色,必须对角色的数据库执行grantRole
action on the role's database.grantRole
操作。
The userAdmin
and userAdminAnyDatabase
built-in roles provide createUser
and grantRole
actions on their respective resources.userAdmin
和userAdminAnyDatabase
内置角色在各自的资源上提供createUser
和grantRole
操作。
Examples实例
The following 以下db.createUser()
operation creates the accountAdmin01
user on the products
database.db.createUser()
操作在产品数据库上创建accountAdmin01
用户。
Starting in version 4.2 of the 从mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. However, you can still specify the password directly as you would with earlier versions of the mongo
shell.mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。但是,您仍然可以像使用早期版本的mongo
shell一样直接指定密码。
use products
db.createUser( { user: "accountAdmin01",
pwd: passwordPrompt(), // Or "<cleartext password>"
customData: { employeeId: 12345 },
roles: [ { role: "clusterAdmin", db: "admin" },
{ role: "readAnyDatabase", db: "admin" },
"readWrite"] },
{ w: "majority" , wtimeout: 5000 } )
The operation gives 该操作赋予accountAdmin01
the following roles:accountAdmin01
以下角色:
theclusterAdmin
andreadAnyDatabase
roles on theadmin
databaseadmin
数据库上的clusterAdmin
和readAnyDatabase
角色thereadWrite
role on theproducts
databaseproducts
数据库上的readWrite
角色
Create User with Roles创建具有角色的用户
The following operation creates 以下操作在accountUser
in the products
database and gives the user the readWrite
and dbAdmin
roles.products
数据库中创建accountUser
,并为用户提供readWrite
和dbAdmin
角色。
Starting in version 4.2 of the 从mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. However, you can still specify the password directly as you would with earlier versions of the mongo
shell.mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。但是,您仍然可以像使用早期版本的mongo
shell一样直接指定密码。
use products
db.createUser(
{
user: "accountUser",
pwd: passwordPrompt(), // Or "<cleartext password>"
roles: [ "readWrite", "dbAdmin" ]
}
)
Create User without Roles创建没有角色的用户
The following operation creates a user named 以下操作在reportsUser
in the admin
database but does not yet assign roles:admin
数据库中创建一个名为reportsUser
的用户,但尚未分配角色:
Starting in version 4.2 of the 从mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。However, you can still specify the password directly as you would with earlier versions of the 但是,您仍然可以像使用早期版本的mongo
shell.mongo
shell一样直接指定密码。
use admin
db.createUser(
{
user: "reportsUser",
pwd: passwordPrompt(), // Or "<cleartext password>"
roles: [ ]
}
)
Create Administrative User with Roles创建具有角色的管理用户
The following operation creates a user named 以下操作在appAdmin
in the admin
database and gives the user readWrite
access to the config
database, which lets the user change certain settings for sharded clusters, such as to the balancer setting.admin
数据库中创建一个名为appAdmin
的用户,并授予用户对配置数据库的readWrite
访问权限,这允许用户更改分片集群的某些设置,例如平衡器设置。
Starting in version 4.2 of the 从mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. However, you can still specify the password directly as you would with earlier versions of the mongo
shell.mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。但是,您仍然可以像使用早期版本的mongo
shell一样直接指定密码。
use admin
db.createUser(
{
user: "appAdmin",
pwd: passwordPrompt(), // Or "<cleartext password>"
roles:
[
{ role: "readWrite", db: "config" },
"clusterAdmin"
]
}
)
Create User with Authentication Restrictions创建具有身份验证限制的用户
The following operation creates a user named 以下操作在restricted
in the admin
database. This user may only authenticate if connecting from IP address 192.0.2.0
to IP address 198.51.100.0
.admin
数据库中创建一个名为restricted
的用户。此用户只能在从IP地址192.0.2.0
连接到IP地址198.51.100.0
时进行身份验证。
Starting in version 4.2 of the 从mongoshell的4.2版本开始,您可以将mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。However, you can still specify the password directly as you would with earlier versions of the 但是,您仍然可以像使用早期版本的mongo
shell.mongo
shell一样直接指定密码。
use admin
db.createUser(
{
user: "restricted",
pwd: passwordPrompt(), // Or "<cleartext password>"
roles: [ { role: "readWrite", db: "reporting" } ],
authenticationRestrictions: [ {
clientSource: ["192.0.2.0"],
serverAddress: ["198.51.100.0"]
} ]
}
)
Create User with SCRAM-SHA-256
Credentials Only仅使用SCRAM-SHA-256
凭据创建用户
SCRAM-SHA-256
Credentials OnlyTo use SCRAM-SHA-256, the 若要使用SCRAM-SHA-256,featureCompatibilityVersion
must be set to 4.0
. For more information on featureCompatibilityVersion, see Get FeatureCompatibilityVersion and setFeatureCompatibilityVersion
.featureCompatibilityVersion
必须设置为4.0
。有关featureCompaibilityVersion
的详细信息,请参阅Get featureCompatibilityVersion和setFeatureCompatibilityVersion
。
The following operation creates a user with only 以下操作将创建一个仅具有SCRAM-SHA-256
credentials.SCRAM-SHA-256
凭据的用户。
Starting in version 4.2 of the 从mongo
shell, you can use the passwordPrompt()
method in conjunction with various user authentication/management methods/commands to prompt for the password instead of specifying the password directly in the method/command call. However, you can still specify the password directly as you would with earlier versions of the mongo
shell.mongo
shell的4.2版本开始,您可以将passwordPrompt()
方法与各种用户身份验证/管理方法/命令结合使用来提示输入密码,而不是直接在方法/命令调用中指定密码。但是,您仍然可以像使用早期版本的mongo
shell一样直接指定密码。
use reporting
db.createUser(
{
user: "reportUser256",
pwd: passwordPrompt(), // Or "<cleartext password>"
roles: [ { role: "readWrite", db: "reporting" } ],
mechanisms: [ "SCRAM-SHA-256" ]
}
)
If the 如果设置了authenticationMechanisms
parameter is set, the mechanisms
field can only include values specified in the authenticationMechanisms
parameter.authenticationMechanisms
参数,则mechanisms
字段只能包括authenticationMechanisms
参数中指定的值。