==================== Configuring Security ==================== The FireWorks tutorials so far have not configured any security on your LaunchPad. We strongly suggest that you password-protect your Mongo database. We'll walk you through this process in this tutorial. Note that if you are using a cloud service to host MongoDB, you should use the instructions provided by that service to configure database security. There are several other actions you can take for added security, such as restricting the IPs that can connect to your Mongo instance. Additional details can be found in the `MongoDB official documentation `_. Create an authenticated user in the admin database ================================================== On your FireServer (which hosts your Mongo database), you must set up at least one user for the admin database. Note that this involves a server restart, so you should not do this during production runs. 1. First, connect to your Mongo instance (MongoDB must already be running in the background):: mongo .. note:: If you are using a non-default port, make sure to specify it. 2. Connect to the admin database and add your user in the Mongo shell:: use admin; db.addUser('admin_user', 'admin_password'); db.auth('admin_user', 'admin_password') use fireworks db.addUser('FW_user', 'FW_password'); use admin db.shutdownServer(); exit 3. Restart MongoDB, but use the ``--auth`` option to enable authentication:: mongod --auth .. note:: If you are using the ``--dbpath`` option, make sure to set it. Your admin user is now configured, and your Mongo instance is now protected from unauthorized access by outsiders without your credentials. Next we must set up your LaunchPad configuration file so that you can authenticate yourself when running Firework scripts. .. note:: Your *admin_user* and *admin_password* can be used to set passwords for all databases in your Mongo installation, including databases that are unrelated to FireWorks. The *FW_user* and *FW_password* are used specifically to log in to the **fireworks** database. Add username and password keys to your LaunchPad file ===================================================== Your LaunchPad file contains the location of the LaunchPad as well as any credentials needed to connect. To connect to an authenticated database: 1. Locate your ``my_launchpad.yaml`` file (perhaps from when you completed the :doc:`Worker tutorial `). If you never created such a file, you can find a template in ``/fw_tutorials/worker/launchpad.yaml``. You might copy it to ``my_launchpad.yaml`` and edit it as necessary. #. Add your username and password to your launchpad file by adding or editing the following lines:: username: password: .. note:: Make sure you use the username/password for your FireWorks database, not your database admin username and password. #. **Make sure you store your LaunchPad file in a secure location with protected filesystem access.** It contains your password as plain text! #. Whenever running any Firework scripts, make sure to specify the ``-l`` option and link to your configuration file. For example:: lpad -l my_launchpad.yaml get_fws or:: rlaunch -l my_launchpad.yaml singleshot To save typing, you can set things up so that the ``-l`` option is automatically set to the correct value. This is especially useful if you want to store your LaunchPad file in a separate directory from the directory that you are running scripts. For details, see the tutorial on :ref:`configfile-label`. Add TLS/SSL configuration to your LaunchPad file ================================================ If the MongoDB server is configured with TLS/SSL then the launchpad file ``my_launchpad.yaml`` (or whatever launchpad file is specified after the ``-l`` option or in the configuration file) has to include further information in the following lines:: authsource: # alternative authentication database (optional) mongoclient_kwargs: tls: # whether to use TLS/SSL for connection to MongoDB, default: false tlsCAFile: # path to the CA certificate to be used for connection tlsCertificateKeyFile: # path to the client certificate and private key (optional) tlsCertificateKeyFilePassword: # passphrase for the client private key (optional) authMechanism: # alternative authentication mechanism (optional) .. note:: If ``tls`` is ``false`` or omitted then all remaining TLS/SSL settings **must** be omitted. If ``tls`` is ``true`` then the connection will be encrypted, ``tlsCAFile`` must be set and the remaining TLS/SSL settings are optional, depending on the specific server policies. .. note:: The client certificate file and the private key file (both in PEM format) must be concatenated in ``tlsCertificateKeyFile``. .. note:: If the private key is encrypted and ``tlsCertificateKeyFilePassword`` is not set then **lpad**, **rlaunch** and **qlaunch** will prompt for the password (passphase) for the private key. .. note:: If ``authMechanism`` is ``MONGODB-X509`` then ``authsource`` must be set to ``$external``, and ``username`` and ``password`` must not be set. Other MongoClient options ========================= The ``mongoclient_kwargs`` option can be used to set any other desired options for MongoClient.