The following lists the security related methods available in
mongosh as well as additional
security reference material.
Security Methods in mongosh
User Management and Authentication Methods
| Name | Description | 
|---|---|
| Authenticates a user to a database. | |
| Changes an existing user's password. | |
| Creates a new user. | |
| Removes a single user. | |
| Deletes all users associated with a database. | |
| Returns information about the specified user. | |
| Returns information about all users associated with a database. | |
| Grants a role and its privileges to a user. | |
| Deprecated. Removes a user from a database. | |
| Removes a role from a user. | |
| Updates user data. | |
| Prompts for the password as an alternative to specifying passwords
directly in various  | 
Role Management Methods
| Name | Description | 
|---|---|
| Creates a role and specifies its privileges. | |
| Deletes a user-defined role. | |
| Deletes all user-defined roles associated with a database. | |
| Returns information for the specified role. | |
| Returns information for all the user-defined roles in a database. | |
| Assigns privileges to a user-defined role. | |
| Removes the specified privileges from a user-defined role. | |
| Specifies roles from which a user-defined role inherits privileges. | |
| Removes inherited roles from a role. | |
| Updates a user-defined role. | 
Security Reference Documentation
- system.rolesCollection in Self-Managed Deployments
- Describes the content of the collection that stores user-defined roles.
- system.usersCollection in Self-Managed Deployments
- Describes the content of the collection that stores users' credentials and role assignments.
- Resource Document on Self-Managed Deployments
- Describes the resource document for roles.
- Privilege Actions
- List of the actions available for privileges.