Skip to main content

Documentation Index

Fetch the complete documentation index at: https://conductorone-groman-network-requirements-updates.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

Capabilities

ResourceSyncProvision
Accounts
Organizations
Teams
Projects
Clusters
Databases
Database users
The MongoDB Atlas connector supports automatic account provisioning and deprovisioning. When a new account is created using the default SCRAM-SHA authentication type, the account’s password is sent to a vault.

Account provisioning

When C1 provisions a new account through the MongoDB Atlas connector, the connector creates a database user in the specified MongoDB Atlas project. By default, the connector also sends an organization invitation to the user’s email address, granting them access to the MongoDB Atlas console. You can disable this behavior by turning off the Create invite setting on the connector.

Provisioning fields

FieldRequiredDescription
EmailYes (unless Create invite is disabled)The email address for the organization invitation.
UsernameYesThe username for the new database user. The required format depends on the authentication type.
Organization IDYesThe ID of the MongoDB Atlas organization.
Group IDYesThe 24-character hex string that identifies the MongoDB Atlas project.
RolesNoOrganization-level roles to assign to the invited user (for example, ORG_MEMBER).
Team IDsNoIDs of organization teams to add the invited user to.
Authentication TypeNoThe authentication method for the database user. Defaults to SCRAM-SHA.

Database user authentication types

The Authentication Type field determines how the provisioned database user authenticates to MongoDB databases. If not specified, this defaults to SCRAM-SHA.
Authentication typeDescriptionUsername format
SCRAM-SHAPassword-based authentication (default). A random password is generated and stored in a C1 vault.Any string
AWS_IAM_USERAWS IAM user authentication.AWS user ARN
X509_CUSTOMERCustomer-managed X.509 certificate authentication.RFC 2253 Distinguished Name
X509_MANAGEDMongoDB Atlas-managed X.509 certificate authentication.RFC 2253 Distinguished Name
LDAP_USERLDAP user authentication.RFC 2253 Distinguished Name
OIDC_WORKLOADOIDC workload identity authentication.<Atlas OIDC IdP ID>/<IdP user identifier>
When using SCRAM-SHA, the provisioned user retrieves their database password from the C1 vault. For all other authentication types, no password is generated. Instead, the database user is created in the $external database, and the user authenticates using their external identity provider.

How provisioning works

When account provisioning runs, the connector performs these steps:
  1. Organization invitation (optional): If Create invite is enabled and an email address is provided, the connector invites the user to the MongoDB Atlas organization. If the user already exists in the organization, this step is skipped.
  2. Database user creation: The connector creates a database user in the specified project with the chosen authentication type. The new database user is assigned a default read role on the admin database. You can grant additional database roles (such as readWrite or dbAdmin) through C1 entitlements after the account is provisioned.

Gather MongoDB Atlas credentials

Configuring the connector requires you to pass in credentials generated in MongoDB Atlas. Gather these credentials before you move on.
A user with Organization Owner access in MongoDB Atlas must perform this task.

Generate an API key in the MongoDB Atlas organization

1
Navigate to the MongoDB Atlas organization you wish to integrate and click Apps.
2
Click Add new and then select API Key.
3
Give the new API key a description, such as “C1 integration”.
4
In the Organization Permissions area, select the relevant permissions:
  • To provision accounts: One of Project Owner, Project Charts Admin, Project Stream Processing Owner, or Project Database Access Admin
  • To provision teams and projects, create invitations to the org for newly provisioned users, and sync data: Organization Owner
  • To sync data with no other capabilities: Organization Read Only
5
Click Next.
6
Under API Access List, click Add Access List Entry. Add the IP addresses listed on the C1 Baton FAQ page, then click Save.
If you’re using a self-hosted connector, add the IP address of your connector host instead.
7
Optional. To sync databases and collections, for each project, add the IP addresses listed on the connector FAQ page to Database & Network Access > IP Access List. See the Sync databases and Enable Mongo driver configuration options below.
8
Carefully copy and save the public key and private key.
Done. Next, move on to the connector configuration instructions.

Configure the MongoDB Atlas connector

To complete this task, you’ll need:
  • The Connector Administrator or Super Administrator role in C1
  • Access to the set of MongoDB Atlas credentials generated by following the instructions above
Follow these instructions to use a built-in, no-code connector hosted by C1.
1
In C1, navigate to Integrations > Connectors and click Add connector.
2
Search for MongoDB Atlas and click Add.
3
Choose how to set up the new MongoDB Atlas connector:
  • Add the connector to a currently unmanaged app (select from the list of apps that were discovered in your identity, SSO, or federation provider that aren’t yet managed with C1)
  • Add the connector to a managed app (select from the list of existing managed apps)
  • Create a new managed app
4
Set the owner for this connector. You can manage the connector yourself, or choose someone else from the list of C1 users. Setting multiple owners is allowed.If you choose someone else, C1 will notify the new connector owner by email that their help is needed to complete the setup process.
5
Click Next.
6
Find the Settings area of the page and click Edit.
7
Paste the public key into the Public key field.
8
Paste the private key into the Private key field.
9
Optional. If desired, click to enable Create invite, which will create email invitations for new MongoDB accounts provisioned by C1.
10
Optional. If desired, click to enable Sync databases and Enable Mongo driver. The combination of these two settings allows the connector to discover and sync databases and collections from MongoDB Atlas clusters.
11
Optional. If desired, click to enable Enable delete database user. This tells the connector to delete database users that only have the read@admin role when revoking access.
12
Click Save.
13
The connector’s label changes to Syncing, followed by Connected. You can view the logs to ensure that information is syncing.
Done. Your MongoDB Atlas connector is now pulling access data into C1.