Configuring Security¶
The FireWorks tutorials so far have not configured any security on your LaunchPad. We strongly suggest that you password-protect your Mongo database. We’ll walk you through this process in this tutorial. Note that if you are using a cloud service to host MongoDB, you should use the instructions provided by that service to configure database security.
There are several other actions you can take for added security, such as restricting the IPs that can connect to your Mongo instance. Additional details can be found in the MongoDB official documentation.
Create an authenticated user in the admin database¶
On your FireServer (which hosts your Mongo database), you must set up at least one user for the admin database. Note that this involves a server restart, so you should not do this during production runs.
First, connect to your Mongo instance (MongoDB must already be running in the background):
mongo
Note
If you are using a non-default port, make sure to specify it.
Connect to the admin database and add your user in the Mongo shell:
use admin; db.addUser('admin_user', 'admin_password'); db.auth('admin_user', 'admin_password') use fireworks db.addUser('FW_user', 'FW_password'); use admin db.shutdownServer(); exit
Restart MongoDB, but use the
--auth
option to enable authentication:mongod --auth
Note
If you are using the
--dbpath
option, make sure to set it.
Your admin user is now configured, and your Mongo instance is now protected from unauthorized access by outsiders without your credentials. Next we must set up your LaunchPad configuration file so that you can authenticate yourself when running Firework scripts.
Note
Your admin_user and admin_password can be used to set passwords for all databases in your Mongo installation, including databases that are unrelated to FireWorks. The FW_user and FW_password are used specifically to log in to the fireworks database.
Add username and password keys to your LaunchPad file¶
Your LaunchPad file contains the location of the LaunchPad as well as any credentials needed to connect. To connect to an authenticated database:
Locate your
my_launchpad.yaml
file (perhaps from when you completed the Worker tutorial). If you never created such a file, you can find a template in<INSTALL_DIR>/fw_tutorials/worker/launchpad.yaml
. You might copy it tomy_launchpad.yaml
and edit it as necessary.Add your username and password to your launchpad file by adding or editing the following lines:
username: <YOUR_FW_USERNAME> password: <YOUR_FW_PASSWORD>
Note
Make sure you use the username/password for your FireWorks database, not your database admin username and password.
Make sure you store your LaunchPad file in a secure location with protected filesystem access. It contains your password as plain text!
Whenever running any Firework scripts, make sure to specify the
-l
option and link to your configuration file. For example:lpad -l my_launchpad.yaml get_fws
or:
rlaunch -l my_launchpad.yaml singleshot
To save typing, you can set things up so that the -l
option is automatically set to the correct value. This is especially useful if you want to store your LaunchPad file in a separate directory from the directory that you are running scripts. For details, see the tutorial on Specifying default locations for the config files.
Add TLS/SSL configuration to your LaunchPad file¶
If the MongoDB server is configured with TLS/SSL then the launchpad file
my_launchpad.yaml
(or whatever launchpad file is specified after the -l
option or in the configuration file) has to include further information in the
following lines:
authsource: <string> # alternative authentication database (optional)
mongoclient_kwargs:
tls: <bool> # whether to use TLS/SSL for connection to MongoDB, default: false
tlsCAFile: <string> # path to the CA certificate to be used for connection
tlsCertificateKeyFile: <string> # path to the client certificate and private key (optional)
tlsCertificateKeyFilePassword: <string> # passphrase for the client private key (optional)
authMechanism: <string> # alternative authentication mechanism (optional)
Note
If tls
is false
or omitted then all remaining TLS/SSL settings must be omitted. If tls
is true
then the connection will be encrypted, tlsCAFile
must be set and the remaining TLS/SSL settings are optional, depending on the specific server policies.
Note
The client certificate file and the private key file (both in PEM format) must be concatenated in tlsCertificateKeyFile
.
Note
If the private key is encrypted and tlsCertificateKeyFilePassword
is not set then lpad, rlaunch and qlaunch will prompt for the password (passphase) for the private key.
Note
If authMechanism
is MONGODB-X509
then authsource
must be set to $external
, and username
and password
must not be set.
Other MongoClient options¶
The mongoclient_kwargs
option can be used to set any other desired options for MongoClient.