On the database side:
The following table gives an overview of TLS versions supported by different databases and provide information about the client side setup:
| DB type | Supported TLS versions | Connection property (if any) | Client-side configuration information | |
| MySQL | TLSv1,TLSv1.1,TLSv1.2 | enabledTLSProtocols |
For Connector/J 8.0.26 and later: The TLSv1 and TLSv1.1 protocols have been deprecated. While you can still connect to the server using those TLS versions, for any such connection, Connector/J writes to its logger the message “This connection is using TLSv1[.1], which is now deprecated and will be removed in a future release of Connector/J”. For more information, see . |
|
| Oracle | undetermined | 1.0 |1.1 | 1.2 |
|
For information about how to configure the version of SSL to be used, see Oracle Database Security Guide at https://docs.oracle.com and choose |
|
| MS SQL Server | 1.0 | 1.1 | 1.2 |
For more information about how to enable TLS 1.2 support for SQL Server 2017 on Windows, SQL Server 2016, SQL Server 2008, SQL Server 2008 R2, SQL Server 2012, and SQL Server 2014, see Microsoft Support at https://support.microsoft.com and choose Knowledge Base Article KB3135244 TLS 1.2 support for Microsoft SQL Server. |
||
| HSQLDB | TLSv1, TLSv1.1, TLSv1.2, or TLSv1.3 |
HSQLDB is used internally only as a file system DB. For external (future use case), use the following Hsqldb TLS URL prefixes:
|
||
On the
Sql Scheme Enabled property. This property is on the MySQLDatabase Property Sheet (to find, expand , and double-click the MySQLDatabase node.Passkey to protect your network PIN. To configure the Passkey, expand , expand your MySql database and double-click Rdb Security Settings.