Documentation Index
Fetch the complete documentation index at: https://conductorone-groman-network-requirements-updates.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Capabilities
| Resource | Sync | Provision |
|---|---|---|
| Accounts | ||
| Organizations | ||
| Teams | ||
| Projects | ||
| Clusters | ||
| Databases | ||
| Database users |
SCRAM-SHA authentication type, the account’s password is sent to a vault.
Account provisioning
When C1 provisions a new account through the MongoDB Atlas connector, the connector creates a database user in the specified MongoDB Atlas project. By default, the connector also sends an organization invitation to the user’s email address, granting them access to the MongoDB Atlas console. You can disable this behavior by turning off the Create invite setting on the connector.Provisioning fields
| Field | Required | Description |
|---|---|---|
| Yes (unless Create invite is disabled) | The email address for the organization invitation. | |
| Username | Yes | The username for the new database user. The required format depends on the authentication type. |
| Organization ID | Yes | The ID of the MongoDB Atlas organization. |
| Group ID | Yes | The 24-character hex string that identifies the MongoDB Atlas project. |
| Roles | No | Organization-level roles to assign to the invited user (for example, ORG_MEMBER). |
| Team IDs | No | IDs of organization teams to add the invited user to. |
| Authentication Type | No | The authentication method for the database user. Defaults to SCRAM-SHA. |
Database user authentication types
The Authentication Type field determines how the provisioned database user authenticates to MongoDB databases. If not specified, this defaults toSCRAM-SHA.
| Authentication type | Description | Username format |
|---|---|---|
SCRAM-SHA | Password-based authentication (default). A random password is generated and stored in a C1 vault. | Any string |
AWS_IAM_USER | AWS IAM user authentication. | AWS user ARN |
X509_CUSTOMER | Customer-managed X.509 certificate authentication. | RFC 2253 Distinguished Name |
X509_MANAGED | MongoDB Atlas-managed X.509 certificate authentication. | RFC 2253 Distinguished Name |
LDAP_USER | LDAP user authentication. | RFC 2253 Distinguished Name |
OIDC_WORKLOAD | OIDC workload identity authentication. | <Atlas OIDC IdP ID>/<IdP user identifier> |
How provisioning works
When account provisioning runs, the connector performs these steps:- Organization invitation (optional): If Create invite is enabled and an email address is provided, the connector invites the user to the MongoDB Atlas organization. If the user already exists in the organization, this step is skipped.
-
Database user creation: The connector creates a database user in the specified project with the chosen authentication type. The new database user is assigned a default
readrole on theadmindatabase. You can grant additional database roles (such asreadWriteordbAdmin) through C1 entitlements after the account is provisioned.
Gather MongoDB Atlas credentials
Configuring the connector requires you to pass in credentials generated in MongoDB Atlas. Gather these credentials before you move on.Generate an API key in the MongoDB Atlas organization
In the Organization Permissions area, select the relevant permissions:
- To provision accounts: One of Project Owner, Project Charts Admin, Project Stream Processing Owner, or Project Database Access Admin
- To provision teams and projects, create invitations to the org for newly provisioned users, and sync data: Organization Owner
- To sync data with no other capabilities: Organization Read Only
Under API Access List, click Add Access List Entry. Add the IP addresses listed on the C1 Baton FAQ page, then click Save.
Optional. To sync databases and collections, for each project, add the IP addresses listed on the connector FAQ page to Database & Network Access > IP Access List. See the Sync databases and Enable Mongo driver configuration options below.
Configure the MongoDB Atlas connector
- Cloud-hosted
- Self-hosted
Follow these instructions to use a built-in, no-code connector hosted by C1.Done. Your MongoDB Atlas connector is now pulling access data into C1.
Choose how to set up the new MongoDB Atlas connector:
- Add the connector to a currently unmanaged app (select from the list of apps that were discovered in your identity, SSO, or federation provider that aren’t yet managed with C1)
- Add the connector to a managed app (select from the list of existing managed apps)
- Create a new managed app
Set the owner for this connector. You can manage the connector yourself, or choose someone else from the list of C1 users. Setting multiple owners is allowed.If you choose someone else, C1 will notify the new connector owner by email that their help is needed to complete the setup process.
Optional. If desired, click to enable Create invite, which will create email invitations for new MongoDB accounts provisioned by C1.
Optional. If desired, click to enable Sync databases and Enable Mongo driver. The combination of these two settings allows the connector to discover and sync databases and collections from MongoDB Atlas clusters.
Optional. If desired, click to enable Enable delete database user. This tells the connector to delete database users that only have the
read@admin role when revoking access.