Skip to content

Commit 4b218f9

Browse files
Merge pull request #270660 from GennadNY/gennadyk-branch24
Update concepts-networking-ssl-tls.md
2 parents 1e1c646 + 4b3fbdd commit 4b218f9

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/postgresql/flexible-server/concepts-networking-ssl-tls.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ There are many connection parameters for configuring the client for SSL. Few imp
8989
**Certificate Authorities (CAs)** are the institutions responsible for issuing certificates. A trusted certificate authority is an entity that’s entitled to verify someone is who they say they are. In order for this model to work, all participants must agree on a set of trusted CAs. All operating systems and most web browsers ship with a set of trusted CAs.
9090

9191
> [!NOTE]
92-
> Using verify-ca and verify-full **sslmode** configuration settings can also be known as **[certificate pinning](../../security/fundamentals/certificate-pinning.md#how-to-address-certificate-pinning-in-your-application)**. In this case root CA certificates on the PostgreSQL server have to match certificate signature and even host name against certificate on the client. Important to remember, you might periodically need to update client stored certificates when Certificate Authorities change or expire on PostgreSQL server certificates.
92+
> Using verify-ca and verify-full **sslmode** configuration settings can also be known as **[certificate pinning](../../security/fundamentals/certificate-pinning.md#how-to-address-certificate-pinning-in-your-application)**. In this case root CA certificates on the PostgreSQL server have to match certificate signature and even host name against certificate on the client. Important to remember, you might periodically need to update client stored certificates when Certificate Authorities change or expire on PostgreSQL server certificates. To determine if you are pinning CAs, please refer to [Certificate pinning and Azure services](../../security/fundamentals/certificate-pinning.md#how-to-address-certificate-pinning-in-your-application).
9393
9494
For more on SSL\TLS configuration on the client, see [PostgreSQL documentation](https://www.postgresql.org/docs/current/ssl-tcp.html#SSL-CLIENT-CERTIFICATES).
9595

@@ -123,6 +123,8 @@ System.setProperty("javax.net.ssl.trustStorePassword","password");
123123
```
124124
6. Replace the original root CA pem file with the combined root CA file and restart your application/client.
125125

126+
> [!NOTE]
127+
> Azure Database for PostgreSQL - Flexible server doesn't support [certificate based authentication](https://www.postgresql.org/docs/current/auth-cert.html) at this time.
126128
127129

128130
## Cipher Suites

0 commit comments

Comments
 (0)