AdminFuat (Admin, MongoDB)
My feedback
9 results found
-
9 votes
We're considering this for inclusion into Q4 (by end of January) - but we're currently reviewing priorities for a number of projects competing for attention.
An error occurred while saving the comment -
455 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedHi Hyung,
Thank you for your feedback. This is a feature currently under active development. I recommend to follow it with existing feedback item: https://feedback.mongodb.com/forums/924145-atlas/suggestions/39906208-granular-permissions
Thank you,
Fuat
-An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedHi Jaime, thank you for the feedback. We are actively working on this feature. I will close this feedback item as it is a duplicate but please follow it here https://feedback.mongodb.com/forums/924145-atlas/suggestions/39906208-granular-permissions to get updates.
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedJust to bring some clarity with a public comment: The status of this ticket was updated to Started on Jul 20, 2022 that means the work to address the request started and MongoDB teams are actively working on it. Please vote for this request to get further updates.
-
1 vote
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedHi Dmitry,
Thank you for bringing this to our attention. We investigated our systems and have been unable to reproduce what you experienced, and we found no abnormalities or any evidence your login information was hijacked in our systems. In the future, if you would like to report a security concern, please feel free to email security@mongodb.com directly.
Thank you!
-
3 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedAPI Access list requirements will be removed for all APIs with upcoming Atlas updates in August 2023. Tentative release date is 08/02. Users can still require Access List for all API calls by enabling the enforcement in project settings.
-
4 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedHi Louri, thank you for your feedback to make Atlas better.
We have plans to make changes in our federated authentication model to break the global domain name impact you mentioned. I will keep updating this feedback item, please stay tuned.
-
1 vote
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedThis is a long term roadmap item. Currently:
- You can use Cross Organization Billing feature for billing related parent-child account set up.
- You can use a separate Federation Management Organization that contains all linked organization owners as org owner. This allows each org owner to access federation app and manage their respective orgs separately while using the same IdP configuration. -
2 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedDamian, thank you for your feedback. We will consider it in our future enhancements.
Meanwhile, you can temporarily add the txt record for the subdomain in your DNS and then remove it right after verifying in Atlas. I hope this will address your concerns around publicly advertising an internal sub-domain.
-
3 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedThank you for your valuable feedback. This feature is in our long term plans; currently we have no specific date for availability. In the meantime, I would kindly suggest using Federated Authentication. By setting up federated authentication in MongoDB Atlas, you will have full control on authentication of your users including enforcing certain MFA methods through your Identity Provider.
-
10 votes
An error occurred while saving the comment AdminFuat (Admin, MongoDB) commentedThank you for the feedback. I want to clarify that MFA can be enforced for users authenticating with their MongoDB cloud accounts. When users access Atlas with federated authentication (Google or SAML), MongoDB does not get the information whether the authentication happened with MFA, and it relies on MFA enforcement at the identity provider. We are closely watching this feature to improve the experience.
Kubernetes Operator does not currently support Workforce / Workload Identity Federation workflows, it is in plans.