

I think this is generally a good thing, especially with Azure SQL databases becoming more common, but the change of checking the SQL Server certificate does introduce a change, especially for servers that might not have certificates set up. Here’s the extracted version of both prior versions and new version behavior:ĭata sent between client and server is encrypted.

However, the most common scenario is that we force encryption from server and do not specify anything else in the connection string. There is a handy chart enumerating them, which can be found here. The combination of the 3 properties influences how the connection will be made. Force Encryption: Mandates that any client connecting to the server to encrypt the communication regardless of the client’s connection string.TrustServerCertificate: Indicates whether the client should just trust the server’s certificate without checking the authenticity of the certificate.Encrypt: Indicates whether the communication should be encrypted.Within the connection string from client side: There are 2 connection string keywords and a server setting that influences how the driver should behave: Obviously, for server administrator, it was usually more desirable to force encryption from the server, so that it would not matter if some old application did not request for it but it would be guaranteed to encrypt its communication with the server. We had the options of forcing encryption from the server side or requesting it within the connection string on the client side. In all prior versions of drivers, the default was to not require encryption. Specifically, they changed how the default settings work for the encryption. That’s great news! However, there is a major breaking changes that requires your attention.
#MS ODBC DRIVER FOR SQL SERVER DRIVERS#
Recently, Microsoft released two new drivers for SQL Server, a major upgrade:
#MS ODBC DRIVER FOR SQL SERVER SOFTWARE#
