Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 1f6d239

Browse files
committed
Refresh special cases for encrypting connections article (UUF 366903)
1 parent 45c09a9 commit 1f6d239

1 file changed

Lines changed: 17 additions & 9 deletions

File tree

docs/database-engine/configure-windows/special-cases-for-encrypting-connections-sql-server.md

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Configure client computer and application for encryption
2+
title: Configure Client Computer and Application for Encryption
33
description: Learn how to configure the client computer and application for encryption using self-signed certificates and a certificate automatically by SQL Server.
44
author: suresh-kandoth
55
ms.author: sureshka
66
ms.reviewer: randolphwest, vanto
7-
ms.date: 10/10/2024
7+
ms.date: 01/30/2025
88
ms.service: sql
99
ms.subservice: configuration
1010
ms.topic: conceptual
@@ -33,25 +33,33 @@ This article provides the procedures for encrypting connections to [!INCLUDE [ss
3333

3434
### Scenario 1: You want to encrypt all the connections to SQL Server
3535

36-
After completing both the procedures documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) and [Step 2: Configure encryption settings in SQL Server](configure-sql-server-encryption.md#step-2-configure-encryption-settings-in-sql-server) documented in [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption.
36+
After completing both the procedures documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) and [Step 2: Configure encryption settings in SQL Server](configure-sql-server-encryption.md#step-2-configure-encryption-settings-in-sql-server) in the article [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption.
3737

38-
<a id="scenario1option1"></a>**Option 1:** Configure client applications to **Trust Server Certificate**. This setting causes the client to skip the step that validates the server certificate and continue with the encryption process. For example, if you're using [!INCLUDE [ssmanstudiofull-md](../../includes/ssmanstudiofull-md.md)] (SSMS) 20 and later versions, you can select **Trust Server Certificate** on the **Login** page (or on the **Options** page in earlier versions).
38+
<a id="scenario1option1"></a>
3939

40-
<a id="scenario1option2"></a>**Option 2:** On each client, add the certificate's issuing authority to the trusted root authority store by performing the following steps:
40+
**Option 1:** Configure client applications to **Trust Server Certificate**. This setting causes the client to skip the step that validates the server certificate and continue with the encryption process. For example, if you're using [!INCLUDE [ssmanstudiofull-md](../../includes/ssmanstudiofull-md.md)] (SSMS) 20 and later versions, you can select **Trust Server Certificate** on the **Login** page (or on the **Options** page in earlier versions).
41+
42+
<a id="scenario1option2"></a>
43+
44+
**Option 2:** On each client, add the certificate's issuing authority to the trusted root authority store by performing the following steps:
4145

4246
1. Export the certificate from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] by using the procedure documented in [Export server certificate](certificate-procedures.md#export-server-certificates).
4347

4448
1. Import the certificate by using the procedure documented in [Export and import certificates](certificate-procedures.md).
4549

4650
### Scenario 2: Only some clients need encrypted connections
4751

48-
After configuring the certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] use as documented in [Step 1: Configure SQL Server to use certificates](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) in [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption:
52+
After you configure the certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] use as documented in [Step 1](configure-sql-server-encryption.md#step-1-configure-sql-server-to-use-certificates) in [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md), use one of the following options to configure your client application for encryption:
4953

50-
<a id="scenario2option1"></a>**Option 1**: Configure client applications to trust the server certificate and specify the encryption keyword in connection properties to *Yes* or *True*. For example, if you're using Microsoft ODBC Driver for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)], the connection string should specify `Encrypt=Yes;TrustServerCertificate=Yes;`.
54+
<a id="scenario2option1"></a>
55+
56+
**Option 1**: Configure client applications to trust the server certificate and specify the encryption keyword in connection properties to *Yes* or *True*. For example, if you're using Microsoft ODBC Driver for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)], the connection string should specify `Encrypt=Yes;TrustServerCertificate=Yes;`.
5157

5258
For more information about server certificates and encryption, see [Using TrustServerCertificate](/dotnet/framework/data/adonet/connection-string-syntax).
5359

54-
<a id="scenario2option2"></a>**Option 2**: On each client, add the certificate's issuing authority to the trusted root authority store and specify encryption parameters to *Yes* in the connection string:
60+
<a id="scenario2option2"></a>
61+
62+
**Option 2**: On each client, add the certificate's issuing authority to the trusted root authority store and specify encryption parameters to *Yes* in the connection string:
5563

5664
1. Export the certificate from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] by using the procedure documented in [Export the certificate](certificate-procedures.md#export-server-certificates) from a computer that's running [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)].
5765

@@ -74,7 +82,7 @@ Configure client applications to trust the server certificate and specify the en
7482
No extra configuration is required on the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] for this scenario.
7583

7684
> [!WARNING]
77-
> SSL connections encrypted using a self-signed certificate don't provide strong security, because the length of the key in the self-signed certificates is shorter than the key in the certificates that're generated by the CA. They are susceptible to man-in-the-middle attacks. You shouldn't rely on SSL using self-signed certificates in a production environment or on servers that're connected to the Internet.
85+
> TLS/SSL connections encrypted using a self-signed certificate don't provide strong security, because the length of the key in the self-signed certificates is shorter than the key in the certificates generated by the CA. They're susceptible to man-in-the-middle attacks. You shouldn't rely on TLS/SSL using self-signed certificates in a production environment or on servers connected to the Internet.
7886
7987
## Related content
8088

0 commit comments

Comments
 (0)