Docs Menu

Docs HomeMongoDB Atlas

Configure Custom Database Roles

On this page

  • Add Custom Roles
  • View Custom Roles
  • Modify Custom Roles
  • Delete Custom Roles
  • Assign Custom Roles
  • Considerations

You can create custom roles in Atlas when the built-in roles don't include your desired set of privileges. Atlas applies each database user's custom roles together with:

  • Any built-in roles you assign when you add a database user or modify a database user.

  • Any specific privileges you assign when you add a database user or modify a database user.

You can assign multiple custom roles to each database user.

The privilege actions available for custom roles and the custom roles API represent a subset of the privilege actions available for built-in roles.

To review the list of custom role privileges, see the API reference.

Note

Free Cluster and Shared Cluster Limitation

Changes to custom roles might take up to 30 seconds to deploy in M0 free clusters and M2/M5 shared clusters.

You cannot delete a custom role in the following scenarios:

  • When deleting the role would leave one or more child roles with no parent roles or actions.

  • When deleting the role would leave one or more database users with no roles.

You can assign custom roles in the Atlas UI when you add a database user or modify a database user. To assign custom roles through the Atlas Administration API, see Create a Database User or Update a Database User.

  • You can assign up to 20 custom roles to a single database user and can create up to 100 custom roles per project. If you require more custom roles per database user or per project, contact Atlas support.

  • Atlas rolls back any role modifications not made through the UI or custom roles API. You must use the Atlas UI or API to add, modify, or delete custom roles on Atlas database deployments.

  • Atlas audits the creation, deletion, and updates of custom MongoDB roles in the project's Activity Feed.

  • If you assign multiple roles to a user and those roles grant conflicting permissions for an object, Atlas honors the highest permissions within any role.

    Example

    You create two custom roles and assign both to User A:

    • The first custom role grants only read privileges on your database. It also grants bypassDocumentValidation on your database.

    • The second role grants dbAdmin privileges on your database. It doesn't grant bypassDocumentValidation, which is an implicit denial of bypass permissions.

    User A would have all of the dbAdmin privileges for your database, since dbAdmin is the higher database access permission. User A would also have bypassDocumentValidation, since bypassDocumentValidation is the higher bypass permission.

←  Configure Database UsersSet Up Passwordless Authentication with AWS IAM →
Give Feedback
© 2022 MongoDB, Inc.

About

  • Careers
  • Investor Relations
  • Legal Notices
  • Privacy Notices
  • Security Information
  • Trust Center
© 2022 MongoDB, Inc.