|
1 | 1 | ---
|
2 |
| -title: TLS configuration in Azure Database for MySQL using Azure portal |
3 |
| -description: Learn how to set TLS configuration using Azure portal for your Azure Database for MySQL |
| 2 | +title: TLS configuration in Azure Database for PostgreSQL Single server using Azure portal |
| 3 | +description: Learn how to set TLS configuration using Azure portal for your Azure Database for PostgreSQL Single server |
4 | 4 | author: kummanish
|
5 | 5 | ms.author: manishku
|
6 |
| -ms.service: mysql |
| 6 | +ms.service: postgresql |
7 | 7 | ms.topic: conceptual
|
8 | 8 | ms.date: 03/10/2020
|
9 | 9 | ---
|
10 | 10 |
|
11 |
| -# Configuring TLS settings in Azure Database for MySQL using Azure portal |
| 11 | +# Configuring TLS settings in Azure Database for PostgreSQL Single server using Azure portal |
12 | 12 |
|
13 |
| -This article describes how you can configure an Azure Database for MySQL server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security. |
| 13 | +This article describes how you can configure an Azure Database for PostgreSQL Single server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security. |
14 | 14 |
|
15 |
| -Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for MySQL. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected. |
| 15 | +Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for PostgreSQL Single server. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected. |
16 | 16 |
|
17 | 17 | ## Prerequisites
|
18 | 18 |
|
19 | 19 | To complete this how-to guide, you need:
|
20 | 20 |
|
21 |
| -* An [Azure Database for MySQL](quickstart-create-mysql-server-database-using-azure-portal.md) |
| 21 | +* An [Azure Database for PostgreSQL](quickstart-create-server-database-portal.md) |
22 | 22 |
|
23 |
| -## Set TLS configurations for Azure Database for MySQL |
| 23 | +## Set TLS configurations for Azure Database for PostgreSQL Single server |
24 | 24 |
|
25 |
| -Follow these steps to set MySQL server minimum TLS version: |
| 25 | +Follow these steps to set PostgreSQL Single server minimum TLS version: |
26 | 26 |
|
27 |
| -* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server. |
| 27 | +* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for PostgreSQL Single server. |
28 | 28 |
|
29 |
| -* On the MySQL server page, under **Settings** heading, click **Connection security** to open the connection security configuration page. |
| 29 | +* On the PostgreSQL Single server page, under **Settings** heading, click **Connection security** to open the connection security configuration page. |
30 | 30 |
|
31 |
| -* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MySQL server. |
| 31 | +* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your PostgreSQL Single server. |
32 | 32 |
|
33 |
| -  |
| 33 | +  |
34 | 34 |
|
35 | 35 | * Click **Save** to save the changes.
|
36 | 36 |
|
37 | 37 | * A notification will confirm that connection security setting was successfully enabled.
|
38 | 38 |
|
39 |
| -  |
| 39 | +  |
40 | 40 |
|
41 | 41 | ## Next steps
|
42 | 42 |
|
|
0 commit comments