You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/database-engine/configure-windows/special-cases-for-encrypting-connections-sql-server.md
+17-9Lines changed: 17 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Configure client computer and application for encryption
2
+
title: Configure Client Computer and Application for Encryption
3
3
description: Learn how to configure the client computer and application for encryption using self-signed certificates and a certificate automatically by SQL Server.
4
4
author: suresh-kandoth
5
5
ms.author: sureshka
6
6
ms.reviewer: randolphwest, vanto
7
-
ms.date: 10/10/2024
7
+
ms.date: 01/30/2025
8
8
ms.service: sql
9
9
ms.subservice: configuration
10
10
ms.topic: conceptual
@@ -33,25 +33,33 @@ This article provides the procedures for encrypting connections to [!INCLUDE [ss
33
33
34
34
### Scenario 1: You want to encrypt all the connections to SQL Server
35
35
36
-
After completing both the procedures documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) and [Step 2: Configure encryption settings in SQL Server](configure-sql-server-encryption.md#step-2-configure-encryption-settings-in-sql-server)documented in[Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption.
36
+
After completing both the procedures documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) and [Step 2: Configure encryption settings in SQL Server](configure-sql-server-encryption.md#step-2-configure-encryption-settings-in-sql-server)in the article[Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption.
37
37
38
-
<aid="scenario1option1"></a>**Option 1:** Configure client applications to **Trust Server Certificate**. This setting causes the client to skip the step that validates the server certificate and continue with the encryption process. For example, if you're using [!INCLUDE [ssmanstudiofull-md](../../includes/ssmanstudiofull-md.md)] (SSMS) 20 and later versions, you can select **Trust Server Certificate** on the **Login** page (or on the **Options** page in earlier versions).
38
+
<aid="scenario1option1"></a>
39
39
40
-
<aid="scenario1option2"></a>**Option 2:** On each client, add the certificate's issuing authority to the trusted root authority store by performing the following steps:
40
+
**Option 1:** Configure client applications to **Trust Server Certificate**. This setting causes the client to skip the step that validates the server certificate and continue with the encryption process. For example, if you're using [!INCLUDE [ssmanstudiofull-md](../../includes/ssmanstudiofull-md.md)] (SSMS) 20 and later versions, you can select **Trust Server Certificate** on the **Login** page (or on the **Options** page in earlier versions).
41
+
42
+
<aid="scenario1option2"></a>
43
+
44
+
**Option 2:** On each client, add the certificate's issuing authority to the trusted root authority store by performing the following steps:
41
45
42
46
1. Export the certificate from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] by using the procedure documented in [Export server certificate](certificate-procedures.md#export-server-certificates).
43
47
44
48
1. Import the certificate by using the procedure documented in [Export and import certificates](certificate-procedures.md).
45
49
46
50
### Scenario 2: Only some clients need encrypted connections
47
51
48
-
After configuring the certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] use as documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) in [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption:
52
+
After you configure the certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] use as documented in [Step 1](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) in [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption:
49
53
50
-
<aid="scenario2option1"></a>**Option 1**: Configure client applications to trust the server certificate and specify the encryption keyword in connection properties to *Yes* or *True*. For example, if you're using Microsoft ODBC Driver for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)], the connection string should specify `Encrypt=Yes;TrustServerCertificate=Yes;`.
54
+
<aid="scenario2option1"></a>
55
+
56
+
**Option 1**: Configure client applications to trust the server certificate and specify the encryption keyword in connection properties to *Yes* or *True*. For example, if you're using Microsoft ODBC Driver for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)], the connection string should specify `Encrypt=Yes;TrustServerCertificate=Yes;`.
51
57
52
58
For more information about server certificates and encryption, see [Using TrustServerCertificate](/dotnet/framework/data/adonet/connection-string-syntax).
53
59
54
-
<aid="scenario2option2"></a>**Option 2**: On each client, add the certificate's issuing authority to the trusted root authority store and specify encryption parameters to *Yes* in the connection string:
60
+
<aid="scenario2option2"></a>
61
+
62
+
**Option 2**: On each client, add the certificate's issuing authority to the trusted root authority store and specify encryption parameters to *Yes* in the connection string:
55
63
56
64
1. Export the certificate from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] by using the procedure documented in [Export the certificate](certificate-procedures.md#export-server-certificates) from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)].
57
65
@@ -74,7 +82,7 @@ Configure client applications to trust the server certificate and specify the en
74
82
No extra configuration is required on the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] for this scenario.
75
83
76
84
> [!WARNING]
77
-
> SSL connections encrypted using a self-signed certificate don't provide strong security, because the length of the key in the self-signed certificates is shorter than the key in the certificates that're generated by the CA. They are susceptible to man-in-the-middle attacks. You shouldn't rely on SSL using self-signed certificates in a production environment or on servers that're connected to the Internet.
85
+
> TLS/SSL connections encrypted using a self-signed certificate don't provide strong security, because the length of the key in the self-signed certificates is shorter than the key in the certificates generated by the CA. They're susceptible to man-in-the-middle attacks. You shouldn't rely on TLS/SSL using self-signed certificates in a production environment or on servers connected to the Internet.
0 commit comments