Configuring Data Encryption Options

On the SSL tab, select the Use a secure connection and select an SSL mode to encrypt the connection and data that is transmitted between the SBM components on this server and your database. You enable this setting on a server-by-server basis—you must manually enable it on each server where SSL encryption from SBM to your database is needed. When the Use a secure connection check box is cleared, SSL encryption is not requested or used.

CAUTION:
Enforcing data encryption can negatively impact performance because an SSL handshake is made for each connection to the database.

Review the following sections to configure SSL for either SQL Server or PostgreSQL.

Configuring SSL with SQL Server

Before you begin, you must configure SSL for SQL Server and install a certificate that meets certain requirements. You must also decide if SQL Server will force encryption or not. Refer to "Encrypting Connections to SQL Server" here for details on configuring SQL Server.

To encrypt connections, select Use SSL in SBM, and then select one of the following options:

Important: With the Request and Require options, the server's certificate is not validated and a self-signed certificate is used instead. This means SBM will not check that the certificate is trusted or that its hostname matches the database server host, which exposes the potential for a man-in-the-middle type of attack. Instead, consider using the Authenticate option, which performs certificate validation on each connection and requires the server to have a certificate issued by a trusted authority.

Configuring SSL with PostgreSQL

Before you begin, you must configure SSL for PostgreSQL and install a certificate that meets certain requirements. You must also decide if PostgreSQL will force encryption or not. Refer to "SSL Support" here for details on configuring PostgreSQL.

To connect to PostgreSQL using SSL, select Use a secure connection and select one of the following SSL modes:

Important: With the Allow, Prefer, and Require options, the server's certificate is not validated and a self-signed certificate is used instead. This means SBM will not check that the certificate is trusted or that its hostname matches the database server host, which exposes the potential for a man-in-the-middle type of attack. Instead, consider using one of the Verify options, which perform certificate validation on each connection and require the server to have a certificate issued by a trusted authority.

You can optionally enable two-way SSL authentication between SBM and PostgreSQL. This forces the client machine (SBM) to identify itself to PostgreSQL in order to complete a secure handshake. To configure this option, perform the following:

  1. Enable and configure SSL in PostgreSQL. In PostgreSQL, ensure that you specify a certificate file that contains all client certificates that will be trusted by the server.
  2. In SBM Configurator, select Use client certificate.
  3. Click Set Client Certificate and enter the location of your certificate file with a private key. The certificate is converted into the following files:

The certificates are placed in the same folder as the selected certificate with private key, and then used by the ODBC and JDBC drivers when connecting to the PostgreSQL database server.

Related Topics

Database Servers