In this chapter, you learned how to configure an application to connect as a database user. As you learned, the security of your application is contingent upon which database user is selected and what roles are assigned to these users. You were shown examples with minimal rights, followed by another section demonstrating applications with expanded rights. In the last section of this chapter, you learned how to configure an application to connect over a TLS connection using x.509 certificates.
In the next chapter, you will learn how to safeguard your database by deploying a replica set.