@@ -132,9 +132,9 @@ B. Generate the Test PEM File for Client
132
132
133
133
cat mongodb-test-client.crt mongodb-test-client.key > test-client.pem
134
134
135
- You can use the :red:`test` PEM file to configure the :binary:`~bin.mongo`
136
- shell for TLS/SSL :red:`testing`. For example, to connect to a
137
- :binary:`~bin.mongod` or a :binary:`~bin.mongos`:
135
+ You can use the :red:`test` PEM file to configure
136
+ :mongosh:`mongosh </>` for TLS/SSL :red:`testing`. For example, to
137
+ connect to a :binary:`~bin.mongod` or a :binary:`~bin.mongos`:
138
138
139
139
.. example::
140
140
@@ -163,7 +163,7 @@ B. Generate the Test PEM File for Client
163
163
openssl pkcs12 -export -out test-client.pfx -inkey mongodb-test-client.key -in mongodb-test-client.crt -certfile mongodb-test-ia.crt
164
164
165
165
Once added to Keychain Access, instead of specifying the Certificate Key
166
- file, you can use the :option:`--tlsCertificateSelector <mongo
166
+ file, you can use the :option:`--tlsCertificateSelector <mongosh
167
167
--tlsCertificateSelector>` to specify the certificate to use. If
168
168
the CA file is also in Keychain Access, you can omit
169
169
``--tlsCAFile`` as well as in the following example:
@@ -174,8 +174,8 @@ B. Generate the Test PEM File for Client
174
174
175
175
mongo --tls --tlsCertificateSelector subject="<TestClientCertificateCommonName>"
176
176
177
- Although still available, :option:`--ssl <mongo --ssl>` and
178
- :option:`--sslCertificateSelector <mongo
177
+ Although still available, :option:`--ssl <mongosh --ssl>` and
178
+ :option:`--sslCertificateSelector <mongosh
179
179
--sslCertificateSelector>` are :ref:`deprecated as of MongoDB 4.2
180
180
<4.2-tls>`.
181
181
0 commit comments