@@ -30,7 +30,7 @@ or `MongoClientSettings <{+api+}/apidocs/mongodb-driver-core/com/mongodb/MongoCl
3030.. note:: Debugging TLS/SSL
3131
3232 If you experience trouble setting up your TLS/SSL connection, you can
33- use the ``-Djavax.net.debug=all`` system property to view additional
33+ use the ``-Djavax.net.debug=all`` system property to view more
3434 log statements. See `the Oracle guide to debugging TLS/SSL connections
3535 <https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ReadDebug.html>`__
3636 for more information.
@@ -89,7 +89,7 @@ Configure Certificates
8989
9090Kotlin applications that initiate TLS/SSL requests require access to
9191cryptographic certificates that prove identity for the application
92- itself as well as other applications with which the application
92+ itself and other applications with which the application
9393interacts. You can configure access to these certificates in your application with
9494the following mechanisms:
9595
@@ -124,7 +124,7 @@ application is genuine and secure from tampering by third parties.
124124If your MongoDB instance uses a certificate that is signed by an
125125authority that is not present in the JRE's default certificate store,
126126your application must configure two system properties to initiate
127- SSL/TLS requests. These properties ensure that your application is able to
127+ SSL/TLS requests. These properties ensure that your application can
128128validate the TLS/SSL certificate presented by a connected MongoDB instance.
129129
130130- ``javax.net.ssl.trustStore``: the path to a trust store containing the
@@ -148,8 +148,8 @@ Configure the JVM Key Store
148148.. note::
149149
150150 By default, MongoDB instances do not perform client certificate
151- validation. You only need to configure the key store if you explicitly
152- configured your MongoDB instance to validate client certificates.
151+ validation. You must configure the key store if you configured your MongoDB
152+ instance to validate client certificates.
153153
154154The JVM key store saves certificates that securely identify your Kotlin
155155application to other applications. Using these certificates, other
@@ -168,11 +168,11 @@ the MongoDB server:
168168
169169You can create a key store with the `keytool
170170<https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html>`__
171- or `openssl <https://www.openssl.org/docs/apps/ openssl.html>`__ command
172- line tools .
171+ or `openssl <https://www.openssl.org/docs/manmaster/man1/ openssl.html>`__
172+ command line tool .
173173
174174For more information on configuring a Kotlin application to use TLS/SSL,
175- please refer to the `JSSE Reference Guide
175+ please see the `JSSE Reference Guide
176176<https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html>`__.
177177
178178.. _tls-disable-hostname-verification:
@@ -195,7 +195,7 @@ Disable Hostname Verification
195195
196196By default, the driver ensures that the hostname included in the server's
197197TLS/SSL certificates matches the hostnames provided when constructing
198- a ``MongoClient``. If you need to disable hostname verification for your
198+ a ``MongoClient``. To disable hostname verification for your
199199application, you can explicitly disable this by setting the
200200``invalidHostNameAllowed`` property of the builder to ``true`` in the
201201``applytoSslSettings()`` builder lambda:
@@ -207,7 +207,7 @@ application, you can explicitly disable this by setting the
207207
208208 Disabling hostname verification can make your configuration
209209 `insecure <https://tlseminar.github.io/docs/mostdangerous.pdf>`__.
210- You should only disable hostname verification for testing purposes or
210+ Disable hostname verification only for testing purposes or
211211 when there is no other alternative.
212212
213213.. _tls-restrict-tls-1.2:
@@ -220,17 +220,17 @@ To restrict your application to use only the TLS 1.2 protocol, set the
220220
221221.. note::
222222
223- Java Runtime Environments (JREs) prior to Java 8 only enabled
223+ Java Runtime Environments (JREs) before Java 8 only enabled
224224 the TLS 1.2 protocol in update releases. If your JRE has not enabled
225- the TLS 1.2 protocol, you may need to upgrade to a later release to
226- connect using TLS 1.2.
225+ the TLS 1.2 protocol, upgrade to a later release to connect by using
226+ TLS 1.2.
227227
228228.. _tls-custom-sslContext:
229229
230230Customize TLS/SSL Configuration through the Java SE SSLContext
231231--------------------------------------------------------------
232232
233- If your TLS/SSL configuration requires additional customization, you can
233+ If your TLS/SSL configuration requires customization, you can
234234set the ``sslContext`` property of your ``MongoClient`` by
235235passing an `SSLContext
236236<https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLContext.html>`__
@@ -274,7 +274,7 @@ Online Certificate Status Protocol (OCSP)
274274
275275OCSP is a standard used to check whether X.509 certificates have been
276276revoked. A certificate authority can add an X.509 certificate to the
277- Certificate Revocation List (CRL) prior to the expiry time to invalidate
277+ Certificate Revocation List (CRL) before the expiry time to invalidate
278278the certificate. When a client sends an X.509 certificate during the TLS
279279handshake, the CA's revocation server checks the CRL and returns a status
280280of "good", "revoked", or "unknown".
@@ -348,7 +348,7 @@ properties:
348348 |
349349 | If unset or set to ``false``, the connection can proceed regardless of the presence or status of the certificate revocation response.
350350
351- For additional information about OCSP, check out the following resources:
351+ For more information about OCSP, check out the following resources:
352352
353353- Oracle JDK 8 Documentation on `how to enable OCSP for an application <https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ocsp.html>`__
354354- :rfc:`Official IETF specification for OCSP (RFC 6960) <6960>`
0 commit comments