Skip to content

Commit 725809b

Browse files
Merge pull request #278149 from GennadNY/gennadyk8989
Update concepts-networking-ssl-tls.md
2 parents 81e373d + 34ec86d commit 725809b

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/postgresql/flexible-server/concepts-networking-ssl-tls.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,9 @@ The Internet Engineering Task Force (IETF) released the TLS 1.3 specification in
5959
> [!NOTE]
6060
> Azure Database for PostgreSQL - Flexible server doesn't support [custom SSL\TLS certificates](https://www.postgresql.org/docs/current/ssl-tcp.html#SSL-CERTIFICATE-CREATION) at this time.
6161
62+
> [!NOTE]
63+
> Microsoft has been going through root CA changes for various Azure services, including Azure Database for PostgreSQL - Flexible Server , as detailed in this [document](../../security/fundamentals/tls-certificate-changes.md) and [Configuring SSL on the Client section below](#configuring-ssl-on-the-client).
64+
6265
To determine your current TLS\SSL connection status, you can load the [sslinfo extension](concepts-extensions.md) and then call the `ssl_is_used()` function to determine if SSL is being used. The function returns t if the connection is using SSL, otherwise it returns f. You can also collect all the information about your Azure Database for PostgreSQL flexible server instance's SSL usage by process, client, and application by using the following query:
6366

6467
```sql
@@ -113,6 +116,7 @@ For more on SSL\TLS configuration on the client, see [PostgreSQL documentation](
113116
> **[DigiCert Global Root G2](https://www.digicert.com/kb/digicert-root-certificates.htm)** and **[Microsoft RSA Root Certificate Authority 2017](https://www.microsoft.com/pkiops/docs/repository.htm)** root CA certificates, as services are migrating from Digicert to Microsoft CA. For legacy compatibility **[Digicert Global Root CA](https://www.digicert.com/kb/digicert-root-certificates.htm)**.
114117
115118

119+
116120
### Downloading Root CA certificates and updating application clients in certificate pinning scenarios
117121

118122
To update client applications in certificate pinning scenarios, you can download certificates from following URIs:

0 commit comments

Comments
 (0)