Skip to content

Commit 14869db

Browse files
Merge pull request #272361 from GennadNY/gennadyk9076
Update concepts-networking-ssl-tls.md
2 parents 95a6f5c + b89ab5f commit 14869db

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

articles/postgresql/flexible-server/concepts-networking-ssl-tls.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Microsoft RSA Root Certificate Authority 2017 https://www.microsoft.com/pkiops/
112112
* Optionally, to prevent future disruption, it's also recommended to add the following roots to the trusted store:
113113
Microsoft ECC Root Certificate Authority 2017 - https://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crt
114114

115-
Detailed information on updating client applications certificate stores with new Root CA certificates has been documented in this [tutorial](../flexible-server/how-to-update-client-certificates-java.md).
115+
Detailed information on updating client applications certificate stores with new Root CA certificates has been documented in this **[tutorial](../flexible-server/how-to-update-client-certificates-java.md)**.
116116

117117
### Read Replicas with certificate pinning scenarios
118118

@@ -124,6 +124,17 @@ Therefore, for clients that use **verify-ca** and **verify-full** sslmode config
124124
> [!NOTE]
125125
> Azure Database for PostgreSQL - Flexible server doesn't support [certificate based authentication](https://www.postgresql.org/docs/current/auth-cert.html) at this time.
126126
127+
### Testing client certificates by connecting with psql in certificate pinning scenarios
128+
129+
You can use psql command line from your client to test connectivity to the server in certificate pinning scenarios, as shown in example below:
130+
131+
```bash
132+
133+
$ psql "host=hostname.postgres.database.azure.com port=5432 user=myuser dbname=mydatabase sslmode=verify-full sslcert=client.crt sslkey=client.key sslrootcert=ca.crt"
134+
135+
```
136+
For more on ssl and certificate parameters you can follow [psql documentation](https://www.postgresql.org/docs/current/app-psql.html)
137+
127138
## Testing SSL/TLS Connectivity
128139

129140
Before trying to access your SSL enabled server from client application, make sure you can get to it via psql. You should see output similar to the following if you established an SSL connection.

0 commit comments

Comments
 (0)