{"version":"1.0","provider_name":"PHEONIXSOLUTIONS","provider_url":"https:\/\/pheonixsolutions.com\/blog","author_name":"admin","author_url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/","title":"Pheonix Solutions - We Empower Your Business Growth","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"rfjYBls9ch\"><a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/\">How to secure MongoDB databases<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/embed\/#?secret=rfjYBls9ch\" width=\"600\" height=\"338\" title=\"&#8220;How to secure MongoDB databases&#8221; &#8212; PHEONIXSOLUTIONS\" data-secret=\"rfjYBls9ch\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/pheonixsolutions.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"How to secure MongoDB databases Date: 22-12-2020 You must edit mongod.conf, MongoDB\u2019s configuration file to enable authentication. Once you enabled it and restart the Mongo service, users will still be able to connect to the database without authenticating. However, they won\u2019t be able to read or modify any data until&hellip; Continue Reading","thumbnail_url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png"}