Configuring Security¶
The FireWorks tutorials so far have not configured any security on your LaunchPad. We strongly suggest that you password-protect your Mongo database. We’ll walk you through this process in this tutorial. Note that if you are using a cloud service to host MongoDB, you should use the instructions provided by that service to configure database security.
There are several other actions you can take for added security, such as restricting the IPs that can connect to your Mongo instance. Additional details can be found in the MongoDB official documentation.
Create an authenticated user in the admin database¶
On your FireServer (which hosts your Mongo database), you must set up at least one user for the admin database. Note that this involves a server restart, so you should not do this during production runs.
First, connect to your Mongo instance (MongoDB must already be running in the background):
mongo
Note
If you are using a non-default port, make sure to specify it.
Connect to the admin database and add your user in the Mongo shell:
use admin; db.addUser('admin_user', 'admin_password'); db.auth('admin_user', 'admin_password') use fireworks db.addUser('FW_user', 'FW_password'); use admin db.shutdownServer(); exit
Restart MongoDB, but use the
--auth
option to enable authentication:mongod --auth
Note
If you are using the
--dbpath
option, make sure to set it.
Your admin user is now configured, and your Mongo instance is now protected from unauthorized access by outsiders without your credentials. Next we must set up your LaunchPad configuration file so that you can authenticate yourself when running Firework scripts.
Note
Your admin_user and admin_password can be used to set passwords for all databases in your Mongo installation, including databases that are unrelated to FireWorks. The FW_user and FW_password are used specifically to log in to the fireworks database.
Add username and password keys to your LaunchPad file¶
Your LaunchPad file contains the location of the LaunchPad as well as any credentials needed to connect. To connect to an authenticated database:
Locate your
my_launchpad.yaml
file (perhaps from when you completed the Worker tutorial). If you never created such a file, you can find a template in<INSTALL_DIR>/fw_tutorials/worker/launchpad.yaml
. You might copy it tomy_launchpad.yaml
and edit it as necessary.Add your username and password to your launchpad file by adding or editing the following lines:
username: <YOUR_FW_USERNAME> password: <YOUR_FW_PASSWORD>
Note
Make sure you use the username/password for your FireWorks database, not your database admin username and password.
Make sure you store your LaunchPad file in a secure location with protected filesystem access. It contains your password as plain text!
Whenever running any Firework scripts, make sure to specify the
-l
option and link to your configuration file. For example:lpad -l my_launchpad.yaml get_fws
or:
rlaunch -l my_launchpad.yaml singleshot
To save typing, you can set things up so that the -l
option is automatically set to the correct value. This is especially useful if you want to store your LaunchPad file in a separate directory from the directory that you are running scripts. For details, see the tutorial on Specifying default locations for the config files.
Add TLS/SSL configuration to your LaunchPad file¶
If the MongoDB server is configured with TLS/SSL launchpad file
my_launchpad.yaml
(or whatever launchpad file is specified after the -l
option or in the configuration file) has to include further information in the following lines:
ssl: <bool> # whether to use TLS/SSL for connection to MongoDB, default: false
ssl_ca_certs: <string> # path to the CA certificate to be used for connection
ssl_certfile: <string> # path to the client certificate (optional)
ssl_keyfile: <string> # path to the client private key (optional)
ssl_pem_passphrase: <string> # passphrase for the client private key (optional)
authsource: <string> # alternative authentication database (optional)
mongoclient_kwargs:
authMechanism: <string> # alternative authentication mechanism (optional)
Note
If ssl
is false
or omitted then all remaining TLS/SSL settings must be omitted. If ssl
is true
then the connection will be encrypted, ssl_ca_certs
must be set and the remaining TLS/SSL settings are optional, depending on the specific server policies.
Note
If ssl_certfile
is set and ssl_keyfile
is not set then the file specified by ssl_certfile
must contain the private key.
Note
If the private key is encrypted and ssl_pem_passphrase
is not set then lpad, rlaunch and qlaunch will prompt for the passphase.
Note
If authmechanism
is MONGODB-X509
then authsource
must be set to $external
, and username
and password
must not be set.
Other Mongoclient options¶
The mongoclient_kwargs
option can be used to set any other desired options for the MongoClient. The format is a dictionary (see authMechanism
above for an example).