In this chapter, you learned how to secure a MongoDB database. This involves enabling security and providing a mechanism for both authentication and authorization. You learned how to create a database user and what database rights (or action privileges) are available, as well as built-in roles. You learned about built-in roles that affect a single database, or all databases, and also roles involved in maintenance. In the last section, you learned how to enable secure communications to and from a MongoDB database using TLS and X.509 certificates.
In the next chapter, you'll put this knowledge to use by writing program applications that require security.