Skip to content

Commit 11d0346

Browse files
markingmynamerwestMSFT
authored andcommitted
[Build validations - May 2nd PR] Acrolinx fixes
1 parent f70a80c commit 11d0346

6 files changed

Lines changed: 407 additions & 461 deletions

docs/database-engine/configure-windows/connect-to-the-database-engine-using-extended-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,13 +107,13 @@ After enabling **Extended Protection** on the server computer, use the following
107107

108108
## Configuring other SQL Server components
109109

110-
For more information about how to configure [!INCLUDE [ssRSnoversion](../../includes/ssrsnoversion-md.md)], see [Extended Protection for Authentication with Reporting Services](../../reporting-services/security/extended-protection-for-authentication-with-reporting-services.md).
110+
For more information about how to configure [!INCLUDE [ssRSnoversion](../../includes/ssrsnoversion-md.md)], see [Extended protection for authentication with Reporting Services](../../reporting-services/security/extended-protection-for-authentication-with-reporting-services.md).
111111

112112
When using IIS to access [!INCLUDE [ssASnoversion](../../includes/ssasnoversion-md.md)] data using an HTTP or HTTPS connection, [!INCLUDE [ssASnoversion](../../includes/ssasnoversion-md.md)] can take advantage of Extended Protection provided by IIS. For more information about how to configure IIS to use Extended Protection, see [Configure Extended Protection in IIS 7.5](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee909472(v=ws.10)).
113113

114114
## Related content
115115

116-
- [Server Network Configuration](../../database-engine/configure-windows/server-network-configuration.md)
117-
- [Client Network Configuration](../../database-engine/configure-windows/client-network-configuration.md)
116+
- [Server Network Configuration](server-network-configuration.md)
117+
- [Client Network Configuration](client-network-configuration.md)
118118
- [Extended Protection for Authentication Overview](/previous-versions/dotnet/netframework-3.5/dd767318(v=vs.90))
119119
- [Integrated Windows Authentication with Extended Protection](/previous-versions/visualstudio/visual-studio-2008/dd639324(v=vs.90))

docs/database-engine/configure-windows/sql-server-and-client-encryption-summary.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: SQL Server and client encryption summary
2+
title: SQL Server and Client Encryption Summary
33
description: Learn about the steps required to encrypt all connections to the SQL Server, enable encryption connections from specific clients and check if the encryption works.
44
author: suresh-kandoth
55
ms.author: sureshka
6-
ms.reviewer: randolphwest
7-
ms.date: 12/08/2022
6+
ms.reviewer: randolphwest, maghan
7+
ms.date: 05/30/2025
88
ms.service: sql
99
ms.subservice: configuration
10-
ms.topic: conceptual
10+
ms.topic: concept-article
1111
---
1212

1313
# SQL Server and client encryption summary
@@ -18,7 +18,7 @@ This article provides a summary of various scenarios and associated procedures f
1818

1919
| Type of certificate | Force encryption in server properties | Import server certificate on each client | Trust Server certificate setting | Encrypt property in the connection string | Comments |
2020
| --- | --- | --- | --- | --- | --- |
21-
| [Self-signed certificate - automatically created by SQL Server](special-cases-for-encrypting-connections-sql-server.md#scenario-1-you-want-to-encrypt-all-the-connections-to-sql-server) | Yes | Can't be done | Yes | Ignored | [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)] and earlier versions use the SHA1 algorithm. [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)] and later versions use SHA256. For more information, see [Changes to hashing algorithm for self-signed certificate in SQL Server 2017](https://techcommunity.microsoft.com/t5/sql-server-support-blog/changes-to-hashing-algorithm-for-self-signed-certificate-in-sql/ba-p/319026). We don't recommend this approach for production use. |
21+
| [Self-signed certificate - automatically created by SQL Server](special-cases-for-encrypting-connections-sql-server.md#scenario-1-you-want-to-encrypt-all-the-connections-to-sql-server) | Yes | Can't be done | Yes | Ignored | [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)] and earlier versions use the SHA1 algorithm. [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)] and later versions use SHA256. For more information, see [Changes to hashing algorithm for self-signed certificate in SQL Server 2017](https://techcommunity.microsoft.com/blog/sqlserversupport/changes-to-hashing-algorithm-for-self-signed-certificate-in-sql-server-2017/319026). We don't recommend this approach for production use. |
2222
| [Self-signed certificate created by using New-SelfSignedCertificate or makecert - Option 1](special-cases-for-encrypting-connections-sql-server.md#scenario1option1) | Yes | No | Yes | Ignored | We don't recommend this approach for production use. |
2323
| [Self-signed certificate created by using New-SelfSignedCertificate or makecert - Option 2](special-cases-for-encrypting-connections-sql-server.md#scenario1option2) | Yes | Yes | Optional | Ignored | We don't recommend this approach for production use. |
2424
| Company's certificate server or from a Certificate Authority (CA) that's not in the [List of Participants - Microsoft Trusted Root Program - Option 1](/security/trusted-root/participants-list) | Yes | No | Yes | Ignored | |
@@ -29,7 +29,7 @@ This article provides a summary of various scenarios and associated procedures f
2929

3030
| Type of certificate | Force encryption in server properties | Import server certificate on each client | Specify Trust Server certificate setting on the client | Manually specify encryption property to Yes/True on the client side | Comments |
3131
| --- | --- | --- | --- | --- | --- |
32-
| [Self-signed certificate - automatically created by SQL Server](special-cases-for-encrypting-connections-sql-server.md#scenario-2-only-some-clients-need-encrypted-connections-1) | Yes | Can't be done | Yes | Ignored | [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)] and earlier versions use the SHA1 algorithm. [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)] and later versions use SHA256. For more information, see [Changes to hashing algorithm for self-signed certificate in SQL Server 2017](https://techcommunity.microsoft.com/t5/sql-server-support-blog/changes-to-hashing-algorithm-for-self-signed-certificate-in-sql/ba-p/319026). We don't recommend this approach for production use. |
32+
| [Self-signed certificate - automatically created by SQL Server](special-cases-for-encrypting-connections-sql-server.md#scenario-2-only-some-clients-need-encrypted-connections-1) | Yes | Can't be done | Yes | Ignored | [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)] and earlier versions use the SHA1 algorithm. [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)] and later versions use SHA256. For more information, see [Changes to hashing algorithm for self-signed certificate in SQL Server 2017](https://techcommunity.microsoft.com/blog/sqlserversupport/changes-to-hashing-algorithm-for-self-signed-certificate-in-sql-server-2017/319026). We don't recommend this approach for production use. |
3333
| [Self-signed certificate created by using New-SelfSignedCertificate or makecert - Option 1](special-cases-for-encrypting-connections-sql-server.md#scenario2option1) | No | No | Yes | Yes | We don't recommend this approach for production use. |
3434
| [Self-signed certificate created by using New-SelfSignedCertificate or makecert - Option 2](special-cases-for-encrypting-connections-sql-server.md#scenario2option2) | No | Yes | Optional | Yes | We don't recommend this approach for production use. |
3535
| Company's certificate server or from a CA that's not in the [List of Participants - Microsoft Trusted Root Program](/security/trusted-root/participants-list) - Option 1 | No | No | Yes | Yes | |
@@ -46,16 +46,13 @@ Alternatively, you can check the encryption status of [!INCLUDE [ssnoversion-md]
4646
1. Execute the following T-SQL command to check the value of `encrypt_option` column. For encrypted connections the value will be `TRUE`.
4747

4848
```sql
49-
SELECT * FROM sys.dm_exec_connections
49+
SELECT * FROM sys.dm_exec_connections;
5050
```
5151

52-
## See also
52+
## Related content
5353

5454
- [TLS 1.2 support for Microsoft SQL Server](/troubleshoot/sql/database-engine/connect/tls-1-2-support-microsoft-sql-server)
5555
- [Securing SQL Server](../../relational-databases/security/securing-sql-server.md)
56-
57-
## Next steps
58-
59-
- [SQL Server Encryption](../../relational-databases/security/encryption/sql-server-encryption.md)
56+
- [SQL Server encryption](../../relational-databases/security/encryption/sql-server-encryption.md)
6057
- [SQL Server fails to start with error 17182](/troubleshoot/sql/security/fails-start-error-17182)
61-
- [Configuring SQL Server instance for certificates](configure-sql-server-encryption.md)
58+
- [Configure SQL Server Database Engine for encrypting connections](configure-sql-server-encryption.md)

0 commit comments

Comments
 (0)