@@ -39,12 +39,12 @@ modify an existing installation) and select *Common Tools for Visual C++* during
3939Only the following version combinations with the [ MongoDB Node.js
4040Driver] ( https://github.com/mongodb/node-mongodb-native ) are considered stable.
4141
42- 42+ 4343| ------------- | -------------- | -------------- |
44- 45- 46- 47- 44+ 45+ 46+ 47+ 4848
4949### Installation
5050
@@ -121,11 +121,6 @@ NOTE: The test suite requires an active kerberos deployment.
121121<dd ></dd >
122122<dt ><a href =" #KerberosServer " >KerberosServer</a ></dt >
123123<dd ></dd >
124- <dt ><del ><a href =" #MongoAuthProcess " >MongoAuthProcess</a ></del ></dt >
125- <dd ><p >A class that was used for MongoDB kerberos authentication with legacy
126- MongoDB Node drivers (<code >mongodb< ; 4.0</code >).</p >
127- <p >Not intended for direct use.</p >
128- </dd >
129124</dl >
130125
131126## Functions
@@ -163,12 +158,12 @@ security could be compromised if you do.</p>
163158## KerberosClient
164159** Properties**
165160
166- | Name | Type | Description |
167- | --------------- | -------------------- | --------------------------------------------------------------- --- |
168- | username | <code >string</code > | The username used for authentication |
169- | response | <code >string</code > | The last response received during authentication steps |
170- | responseConf | <code >string</code > | Indicates whether confidentiality was applied or not (GSSAPI only) |
171- | contextComplete | <code >boolean</code > | Indicates that authentication has successfully completed or not |
161+ | Name | Type | Description |
162+ | --- | --- | --- |
163+ | username | <code >string</code > | The username used for authentication |
164+ | response | <code >string</code > | The last response received during authentication steps |
165+ | responseConf | <code >string</code > | Indicates whether confidentiality was applied or not (GSSAPI only) |
166+ | contextComplete | <code >boolean</code > | Indicates that authentication has successfully completed or not |
172167
173168
174169* [ KerberosClient] ( #KerberosClient )
@@ -184,8 +179,8 @@ security could be compromised if you do.</p>
184179
185180### * kerberosClient* .step(challenge)
186181
187- | Param | Type | Description |
188- | --------- | ------------------- | --------------------------------------------------------------------------------------- --- |
182+ | Param | Type | Description |
183+ | --- | --- | --- |
189184| challenge | <code >string</code > | A string containing the base64-encoded server data (which may be empty for the first step) |
190185
191186Processes a single kerberos client-side step using the supplied server challenge.
@@ -195,11 +190,11 @@ Processes a single kerberos client-side step using the supplied server challenge
195190
196191### * kerberosClient* .wrap(challenge, [ options] )
197192
198- | Param | Type | Description |
199- | ----------------- | -------------------- | --------------------------------------------------------- --- |
200- | challenge | <code >string</code > | The response returned after calling ` unwrap ` |
201- | [ options] | <code >object</code > | Optional settings |
202- | [ options.user] | <code >string</code > | The user to authorize |
193+ | Param | Type | Description |
194+ | --- | --- | --- |
195+ | challenge | <code >string</code > | The response returned after calling ` unwrap ` |
196+ | [ options] | <code >object</code > | Optional settings |
197+ | [ options.user] | <code >string</code > | The user to authorize |
203198| [ options.protect] | <code >boolean</code > | Indicates if the wrap should request message confidentiality |
204199
205200Perform the client side kerberos wrap step.
@@ -209,8 +204,8 @@ Perform the client side kerberos wrap step.
209204
210205### * kerberosClient* .unwrap(challenge)
211206
212- | Param | Type | Description |
213- | --------- | ------------------- | ----------------------------------------------- --- |
207+ | Param | Type | Description |
208+ | --- | --- | --- |
214209| challenge | <code >string</code > | A string containing the base64-encoded server data |
215210
216211Perform the client side kerberos unwrap step
@@ -221,19 +216,19 @@ Perform the client side kerberos unwrap step
221216## KerberosServer
222217** Properties**
223218
224- | Name | Type | Description |
225- | --------------- | -------------------- | ------------------------------------------------------------ --- |
226- | username | <code >string</code > | The username used for authentication |
227- | response | <code >string</code > | The last response received during authentication steps |
228- | targetName | <code >string</code > | The target used for authentication |
219+ | Name | Type | Description |
220+ | --- | --- | --- |
221+ | username | <code >string</code > | The username used for authentication |
222+ | response | <code >string</code > | The last response received during authentication steps |
223+ | targetName | <code >string</code > | The target used for authentication |
229224| contextComplete | <code >boolean</code > | Indicates that authentication has successfully completed or not |
230225
231226<a name =" KerberosServer+step " ></a >
232227
233228### * kerberosServer* .step(challenge)
234229
235- | Param | Type | Description |
236- | --------- | ------------------- | ----------------------------------------------- --- |
230+ | Param | Type | Description |
231+ | --- | --- | --- |
237232| challenge | <code >string</code > | A string containing the base64-encoded client data |
238233
239234Processes a single kerberos server-side step using the supplied client data.
@@ -243,12 +238,12 @@ Processes a single kerberos server-side step using the supplied client data.
243238
244239## checkPassword(username, password, service, [ defaultRealm] )
245240
246- | Param | Type | Description |
247- | -------------- | ------------------- | ----------------------------------------------------------------------------------- --- |
248- | username | <code >string</code > | The Kerberos user name. If no realm is supplied, then the ` defaultRealm ` will be used. |
249- | password | <code >string</code > | The password for the user. |
250- | service | <code >string</code > | The Kerberos service to check access for. |
251- | [ defaultRealm] | <code >string</code > | The default realm to use if one is not supplied in the user argument. |
241+ | Param | Type | Description |
242+ | --- | --- | --- |
243+ | username | <code >string</code > | The Kerberos user name. If no realm is supplied, then the ` defaultRealm ` will be used. |
244+ | password | <code >string</code > | The password for the user. |
245+ | service | <code >string</code > | The Kerberos service to check access for. |
246+ | [ defaultRealm] | <code >string</code > | The default realm to use if one is not supplied in the user argument. |
252247
253248This function provides a simple way to verify that a user name and password
254249match those normally used for Kerberos authentication.
@@ -271,10 +266,10 @@ security could be compromised if you do.
271266
272267## principalDetails(service, hostname)
273268
274- | Param | Type | Description |
275- | -------- | ------------------- | -------------------------------------- --- |
276- | service | <code >string</code > | The Kerberos service type for the server. |
277- | hostname | <code >string</code > | The hostname of the server. |
269+ | Param | Type | Description |
270+ | --- | --- | --- |
271+ | service | <code >string</code > | The Kerberos service type for the server. |
272+ | hostname | <code >string</code > | The hostname of the server. |
278273
279274This function returns the service principal for the server given a service type and hostname.
280275
@@ -285,13 +280,13 @@ Details are looked up via the `/etc/keytab` file.
285280
286281## initializeClient(service, [ options] )
287282
288- | Param | Type | Description |
289- | ------------------- | ------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- --- |
290- | service
| <
code >string</
code >
| A string containing the service principal in the form 'type@fqdn' (e.g. '
[email protected] ').
| 291- | [ options] | <code >object</code > | Optional settings |
292- | [ options.principal
] | <
code >string</
code >
| Optional string containing the client principal in the form 'user@realm' (e.g. '
[email protected] ').
| 293- | [ options.flags] | <code >number</code > | Optional integer used to set GSS flags. (e.g. ` GSS_C_DELEG_FLAG\|GSS_C_MUTUAL_FLAG\|GSS_C_SEQUENCE_FLAG ` will allow for forwarding credentials to the remote host) |
294- | [ options.mechOID] | <code >number</code > | Optional GSS mech OID. Defaults to None (GSS_C_NO_OID). Other possible values are ` GSS_MECH_OID_KRB5 ` , ` GSS_MECH_OID_SPNEGO ` . |
283+ | Param | Type | Description |
284+ | --- | --- | --- |
285+ | service
| <
code >string</
code >
| A string containing the service principal in the form 'type@fqdn' (e.g. '
[email protected] ').
| 286+ | [ options] | <code >object</code > | Optional settings |
287+ | [ options.principal
] | <
code >string</
code >
| Optional string containing the client principal in the form 'user@realm' (e.g. '
[email protected] ').
| 288+ | [ options.flags] | <code >number</code > | Optional integer used to set GSS flags. (e.g. ` GSS_C_DELEG_FLAG\|GSS_C_MUTUAL_FLAG\|GSS_C_SEQUENCE_FLAG ` will allow for forwarding credentials to the remote host) |
289+ | [ options.mechOID] | <code >number</code > | Optional GSS mech OID. Defaults to None (GSS_C_NO_OID). Other possible values are ` GSS_MECH_OID_KRB5 ` , ` GSS_MECH_OID_SPNEGO ` . |
295290
296291Initializes a context for client-side authentication with the given service principal.
297292
@@ -300,8 +295,8 @@ Initializes a context for client-side authentication with the given service prin
300295
301296## initializeServer(service)
302297
303- | Param | Type | Description |
304- | ------- | ------------------- | -------------------------------------------------------------------------------------------- --- |
298+ | Param | Type | Description |
299+ | --- | --- | --- |
305300| service
| <
code >string</
code >
| A string containing the service principal in the form 'type@fqdn' (e.g. '
[email protected] ').
| 306301
307302Initializes a context for server-side authentication with the given service principal.
0 commit comments