You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[Transparent Network IP Resolution](odbc/using-transparent-network-ip-resolution.md)||[Yes](/dotnet/api/microsoft.data.sqlclient.sqlconnection.connectionstring?view=sqlclient-dotnet-1.1&preserve-view=true)||[Yes](/dotnet/api/system.data.sqlclient.sqlconnection.connectionstring?view=netframework-4.8&preserve-view=true)|
| <aid="table2"></a>Feature |[ODBC Driver for SQL Server on Windows](odbc/microsoft-odbc-driver-for-sql-server.md)|[ODBC Driver for SQL Server on Linux and macOS](odbc/microsoft-odbc-driver-for-sql-server.md)|[JDBC Driver for SQL Server](jdbc/microsoft-jdbc-driver-for-sql-server.md)|[OLE DB Driver for SQL Server](oledb/oledb-driver-for-sql-server.md)|
52
52
| :-- | :-- | :-- | :-- | :-- |
@@ -66,7 +66,7 @@ We wish all drivers supported every feature and spend effort to ensure feature p
| <aid="table3"></a>Feature |[Drivers for PHP for SQL Server on Windows](php/microsoft-php-driver-for-sql-server.md)<sup>[1](#note1)</sup> |[Drivers for PHP for SQL Server on Linux and macOS](php/microsoft-php-driver-for-sql-server.md)<sup>[1](#note1)</sup> |[Tedious (Node.js)](node-js/node-js-driver-for-sql-server.md)|[pyODBC (Python)](python/pyodbc/python-sql-driver-pyodbc.md)<sup>[1](#note1)</sup> |
72
72
| :-- | :-- | :-- | :-- | :-- |
@@ -86,7 +86,7 @@ We wish all drivers supported every feature and spend effort to ensure feature p
|[Transparent Network IP Resolution](odbc/using-transparent-network-ip-resolution.md)|[Yes](php/php-driver-for-sql-server-support-for-high-availability-disaster-recovery.md)|[Yes](php/php-driver-for-sql-server-support-for-high-availability-disaster-recovery.md)||[Yes](odbc/using-transparent-network-ip-resolution.md)|
<aid="note1"></a><sup>1</sup> Since these drivers rely on the Microsoft ODBC Driver for SQL Server, a version of that driver that supports the feature must also be used.
Copy file name to clipboardExpand all lines: docs/connect/oledb/features/encryption-and-certificate-validation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ The following table describes the resulting encryption and validation:
64
64
> The preceding table only provides a guide on the system behavior under different configurations. For secure connectivity, ensure that the client and server both require encryption (for server-side configuration, see [Configure encryption settings in SQL Server](../../../database-engine/configure-windows/configure-sql-server-encryption.md#step-2-configure-encryption-settings-in-sql-server)). Also ensure that the server has a verifiable certificate, and that the **`TrustServerCertificate`** setting on the client is set to FALSE.
65
65
66
66
> [!NOTE]
67
-
> Starting from version 19.2 of the OLE DB driver, TDS 8.0 connections can be configured to use TLS 1.3. For more information, see [TLS 1.3 support](../../../relational-databases/security/networking/tds-8-and-tls-1-3.md).
67
+
> Starting from version 19.2 of the OLE DB driver, TDS 8.0 connections can be configured to use TLS 1.3. For more information, see [TLS 1.3 support](../../../relational-databases/security/networking/tls-1-3.md).
68
68
69
69
### Major version 18 with new authentication methods
Copy file name to clipboardExpand all lines: docs/connect/oledb/release-notes-for-oledb-driver-for-sql-server.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ If you need to download the installer in a language other than the one detected
84
84
85
85
| Feature added | Details |
86
86
| :------------ | :------ |
87
-
| Support for TLS 1.3 | TDS 8.0 connections can now be configured to use TLS 1.3. For more details, see [TLS 1.3 support](../../relational-databases/security/networking/tds-8-and-tls-1-3.md). |
87
+
| Support for TLS 1.3 | TDS 8.0 connections can now be configured to use TLS 1.3. For more details, see [TLS 1.3 support](../../relational-databases/security/networking/tls-1-3.md). |
88
88
| Support for the `Server Certificate` connection string keyword, and the `SSPROP_INIT_SERVER_CERTIFICATE` initialization property | The user may now specify the path to a certificate file to match against the SQL Server TLS/SSL certificate. <br/><br/>For more information, see: [Using connection string keywords](applications/using-connection-string-keywords-with-oledb-driver-for-sql-server.md). |
Copy file name to clipboardExpand all lines: docs/database-engine/configure-windows/certificate-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Enabling TLS encryption increases the security of data transmitted across networ
27
27
- Packets sent from the instance of SQL Server to the application must be encrypted by the server TLS stack and decrypted by the client TLS stack.
28
28
29
29
> [!IMPORTANT]
30
-
> Starting with SQL Server 2016 (13.x), Secure Sockets Layer (SSL) has been discontinued. Use TLS (TLS 1.2 is recommended) instead. For more information, see [KB3135244 - TLS 1.2 support for Microsoft SQL Server](https://support.microsoft.com/topic/kb3135244-tls-1-2-support-for-microsoft-sql-server-e4472ef8-90a9-13c1-e4d8-44aad198cdbe). SQL Server 2022 introduces support for TLS 1.3. For more information, see [TDS 8.0 and TLS 1.3 support](../../relational-databases/security/networking/tds-8-and-tls-1-3.md).
30
+
> Starting with SQL Server 2016 (13.x), Secure Sockets Layer (SSL) has been discontinued. Use TLS (TLS 1.2 is recommended) instead. For more information, see [KB3135244 - TLS 1.2 support for Microsoft SQL Server](https://support.microsoft.com/topic/kb3135244-tls-1-2-support-for-microsoft-sql-server-e4472ef8-90a9-13c1-e4d8-44aad198cdbe). SQL Server 2022 introduces support for TLS 1.3. For more information, see [TLS 1.3 support](../../relational-databases/security/networking/tls-1-3.md).
31
31
> If no matching protocols exist between the client and server computer, you can run into the error described in [An existing connection was forcibly closed by the remote host](/troubleshoot/sql/connect/tls-exist-connection-closed).
32
32
33
33
## Digital certificate overview
@@ -55,4 +55,4 @@ To prove that a certificate holder is who they claim to be, the certificate must
55
55
| --- | --- | --- | --- |
56
56
| Certificate subject match | The certificate's **Subject** field contains the common name (CN) of the host. For example, the certificate that's issued to `www.contoso.com` can be used for the web site `https://www.contoso.com`. | - Compatible with all clients, devices, and services.<br /><br />- Compartmentalization. Revoking the certificate for a host doesn't affect other hosts. | - Number of certificates required. You can only use the certificate for the specified host. For example, you can't use the `www.contoso.com` certificate for `ftp.contoso.com`, even when the services are installed on the same server.<br /><br />- Complexity. On a web server, each certificate requires its own IP address binding. |
57
57
| Certificate subject alternative name (SAN) match | In addition to the **Subject** field, the certificate's **Subject Alternative Name** field contains a list of multiple host names. For example:<br />`www.contoso.com`<br />`ftp.contoso.com`<br />`ftp.eu.fabirkam.net`| - Convenience. You can use the same certificate for multiple hosts in multiple, separate domains.<br /><br />- Most clients, devices, and services support SAN certificates.<br /><br />- Auditing and security. You know exactly which hosts are capable of using the SAN certificate. | - More planning required. You need to provide the list of hosts when you create the certificate.<br /><br />- Lack of compartmentalization. You can't selectively revoke certificates for some of the specified hosts without affecting all of the hosts in the certificate. |
58
-
| Wildcard certificate match | The certificate's **Subject** field contains the common name as the wildcard character (*) plus a single domain or subdomain. For example, `*.contoso.com` or `*.eu.contoso.com`. The `*.contoso.com` wildcard certificate can be used for:<br />`www.contoso.com`<br />`ftp.contoso.com`<br />`mail.contoso.com` | Flexibility. You don't need to provide a list of hosts when you request the certificate, and you can use the certificate on any number of hosts that you may need in the future. | - You can't use wildcard certificates with other top-level domains (TLDs). For example, you can't use the `*.contoso.com` wildcard certificate for `*.contoso.net` hosts.<br /><br />- You can only use wildcard certificates for host names at the level of the wildcard. For example, you can't use the `*.contoso.com` certificate for `www.eu.contoso.com`. Or, you can't use the `*.eu.contoso.com` certificate for `www.uk.eu.contoso.com`.<br /><br />- Older clients, devices, applications, or services might not support wildcard certificates.<br /><br />- Wildcards aren't available with Extended Validation (EV) certificates.<br /><br />- Careful auditing and control are required. If the wildcard certificate is compromised, it affects every host in the specified domain. |
58
+
| Wildcard certificate match | The certificate's **Subject** field contains the common name as the wildcard character (*) plus a single domain or subdomain. For example, `*.contoso.com` or `*.eu.contoso.com`. The `*.contoso.com` wildcard certificate can be used for:<br />`www.contoso.com`<br />`ftp.contoso.com`<br />`mail.contoso.com` | Flexibility. You don't need to provide a list of hosts when you request the certificate, and you can use the certificate on any number of hosts that you may need in the future. | - You can't use wildcard certificates with other top-level domains (TLDs). For example, you can't use the `*.contoso.com` wildcard certificate for `*.contoso.net` hosts.<br /><br />- You can only use wildcard certificates for host names at the level of the wildcard. For example, you can't use the `*.contoso.com` certificate for `www.eu.contoso.com`. Or, you can't use the `*.eu.contoso.com` certificate for `www.uk.eu.contoso.com`.<br /><br />- Older clients, devices, applications, or services might not support wildcard certificates.<br /><br />- Wildcards aren't available with Extended Validation (EV) certificates.<br /><br />- Careful auditing and control are required. If the wildcard certificate is compromised, it affects every host in the specified domain. |
Copy file name to clipboardExpand all lines: docs/relational-databases/security/networking/connect-with-strict-encryption.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ In this article, we'll show you how to connect to [!INCLUDE [sssql22-md](../../.
28
28
29
29
## Connect to SQL Server using a .NET application
30
30
31
-
For information on building and connecting to SQL Server using the `strict` encryption type, see [Connection String Syntax](/dotnet/framework/data/adonet/connection-string-syntax) on how to properly build the connection string. For more information on the new connection string properties, see [Additional changes to connection string encryption properties](./tds-8-and-tls-1-3.md#additional-changes-to-connection-string-encryption-properties).
31
+
For information on building and connecting to SQL Server using the `strict` encryption type, see [Connection String Syntax](/dotnet/framework/data/adonet/connection-string-syntax) on how to properly build the connection string. For more information on the new connection string properties, see [Additional changes to connection string encryption properties](./tds-8.md#additional-changes-to-connection-string-encryption-properties).
32
32
33
33
## Connect using an ODBC DSN
34
34
@@ -90,4 +90,4 @@ If you see `SSL certificate validation failed`, validate that:
90
90
91
91
## See also
92
92
93
-
-[TDS 8.0 and TLS 1.3 support](tds-8-and-tls-1-3.md)
0 commit comments