Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit ea83165

Browse files
authored
Merge pull request #14499 from TimShererWithAquent/us1679050eq
Change SSL to TLS per 1679050
2 parents b8c886e + f389fd0 commit ea83165

3 files changed

Lines changed: 6 additions & 6 deletions

File tree

docs/connect/jdbc/fips-mode.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The Microsoft JDBC Driver for SQL Server supports running in JVMs configured to
1919
#### Prerequisites
2020

2121
- FIPS configured JVM
22-
- Appropriate SSL Certificate
22+
- Appropriate TLS/SSL Certificate
2323
- Appropriate policy files
2424
- Appropriate Configuration parameters
2525

@@ -32,11 +32,11 @@ To see the approved modules for FIPS Configuration, refer to [Validated Modules
3232
Vendors may have some additional steps to configure a JVM with FIPS.
3333

3434
## Appropriate SSL certificate
35-
In order to connect to SQL Server in FIPS mode, a valid SSL Certificate is required. Install or import it into the Java Key Store on the client machine (JVM) where FIPS is enabled.
35+
In order to connect to SQL Server in FIPS mode, a valid TLS/SSL Certificate is required. Install or import it into the Java Key Store on the client machine (JVM) where FIPS is enabled.
3636

3737
### Importing SSL certificate in Java keyStore
3838
For FIPS, most likely you need to import the certificate (.cert) in either PKCS or a provider-specific format.
39-
Use the following snippet to import the SSL certificate and store it in a working directory with the appropriate KeyStore format. _TRUST\_STORE\_PASSWORD_ is your password for Java KeyStore.
39+
Use the following snippet to import the TLS/SSL certificate and store it in a working directory with the appropriate KeyStore format. _TRUST\_STORE\_PASSWORD_ is your password for Java KeyStore.
4040

4141
```java
4242
public void saveGenericKeyStore(
@@ -66,7 +66,7 @@ private Certificate getCertificate(String pathName)
6666
}
6767
```
6868

69-
The following example is importing an Azure SSL Certificate in PKCS12 format with the BouncyCastle Provider. The certificate is imported in the working directory named _MyTrustStore\_PKCS12_ by using the following snippet:
69+
The following example is importing an Azure TLS/SSL Certificate in PKCS12 format with the BouncyCastle Provider. The certificate is imported in the working directory named _MyTrustStore\_PKCS12_ by using the following snippet:
7070

7171
`saveGenericKeyStore(BCFIPS, PKCS12, "SQLAzure SSL Certificate Name", "SQLAzure.cer");`
7272

docs/database-engine/configure-windows/configure-the-network-packet-size-server-configuration-option.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ ms.author: mikeray
4949
- The maximum network packet size for encrypted connections is 16,383 bytes.
5050

5151
> [!NOTE]
52-
> If MARS is enabled, the SMUX provider will add a 16-byte header to the packet before SSL encryption, reducing the maximum network packet size to 16368 bytes.
52+
> If MARS is enabled, the SMUX provider will add a 16-byte header to the packet before TLS encryption, reducing the maximum network packet size to 16368 bytes.
5353
5454
### <a name="Recommendations"></a> Recommendations
5555

docs/relational-databases/polybase/polybase-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article provides a reference for various configuration settings that affect
1919

2020
## <a id="rpcprotection"></a> Hadoop.RPC.Protection setting
2121

22-
A common way to secure communication in a hadoop cluster is by changing the hadoop.rpc.protection configuration to 'Privacy' or 'Integrity'. By default, PolyBase assumes the configuration is set to 'Authenticate'. To override this default, add the following property to the core-site.xml file. Changing this configuration will enable secure data transfer among the hadoop nodes and SSL connection to SQL Server.
22+
A common way to secure communication in a hadoop cluster is by changing the hadoop.rpc.protection configuration to 'Privacy' or 'Integrity'. By default, PolyBase assumes the configuration is set to 'Authenticate'. To override this default, add the following property to the core-site.xml file. Changing this configuration will enable secure data transfer among the hadoop nodes and TLS connection to SQL Server.
2323

2424
```xml
2525
<!-- RPC Encryption information, PLEASE FILL THESE IN ACCORDING TO HADOOP CLUSTER CONFIG -->

0 commit comments

Comments
 (0)