--- title: Security limitations for SQL Server on Linux | Microsoft Docs description: This topic describes SQL Server on Linux restrictions. author: BYHAM ms.author: rickbyh manager: jhubbard ms.date: 10/02/2017 ms.topic: article ms.prod: "sql-non-specified" ms.prod_service: "database-engine" ms.service: "" ms.component: sql-linux ms.suite: "sql" ms.custom: "" ms.technology: database-engine ms.assetid: 64da74cc-14bf-4636-a55e-8cc1fce2aaff ms.workload: "Inactive" --- # Security limitations for SQL Server on Linux [!INCLUDE[tsql-appliesto-sslinux-only](../includes/tsql-appliesto-sslinux-only.md)] SQL Server on Linux currently has the following limitations: * A standard password policy is provided. MUST_CHANGE is the only option you may configure. * Extensible Key Management is not supported. * Using keys stored in the Azure Key Vault is not supported. * SQL Server generates its own self-signed certificate for encrypting connections. Currently, SQL Server cannot be configured to use a user provided certificate for SSL or TLS. For more infomation about security features available in SQL Server, see the [Security Center for SQL Server Database Engine and Azure SQL Database](../relational-databases/security/security-center-for-sql-server-database-engine-and-azure-sql-database.md). ## Next steps For common security tasks, see [Get started with security features of SQL Server on Linux](sql-server-linux-security-get-started.md). For a script to change the TCP port number, the SQL Server directories, and configure traceflags or collation, see [Configure SQL Server on Linux with mssql-conf](sql-server-linux-configure-mssql-conf.md).