Skip to content

Commit 904997e

Browse files
authored
Merge pull request #110365 from TimShererWithAquent/us1679050do
Change SSL to TLS per 1679050
2 parents 0318dea + 1342565 commit 904997e

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

articles/sql-database/sql-database-elastic-scale-split-merge-security-configuration.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ To use the Split/Merge service, you must correctly configure security. The servi
2020

2121
Certificates are configured in two ways.
2222

23-
1. [To Configure the SSL Certificate](#to-configure-the-ssl-certificate)
23+
1. [To Configure the TLS/SSL Certificate](#to-configure-the-tlsssl-certificate)
2424
2. [To Configure Client Certificates](#to-configure-client-certificates)
2525

2626
## To obtain certificates
@@ -43,26 +43,26 @@ If those options are not available, you can generate **self-signed certificates*
4343
%ProgramFiles(x86)%\Windows Kits\x.y\bin\x86
4444
* Get the WDK from [Windows 8.1: Download kits and tools](https://msdn.microsoft.com/windows/hardware/gg454513#drivers)
4545

46-
## To configure the SSL certificate
46+
## To configure the TLS/SSL certificate
4747

48-
An SSL certificate is required to encrypt the communication and authenticate the server. Choose the most applicable of the three scenarios below, and execute all its steps:
48+
A TLS/SSL certificate is required to encrypt the communication and authenticate the server. Choose the most applicable of the three scenarios below, and execute all its steps:
4949

5050
### Create a new self-signed certificate
5151

5252
1. [Create a Self-Signed Certificate](#create-a-self-signed-certificate)
53-
2. [Create PFX file for Self-Signed SSL Certificate](#create-pfx-file-for-self-signed-ssl-certificate)
54-
3. [Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
55-
4. [Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
56-
5. [Import SSL Certification Authority](#import-ssl-certification-authority)
53+
2. [Create PFX file for Self-Signed TLS/SSL Certificate](#create-pfx-file-for-self-signed-tlsssl-certificate)
54+
3. [Upload TLS/SSL Certificate to Cloud Service](#upload-tlsssl-certificate-to-cloud-service)
55+
4. [Update TLS/SSL Certificate in Service Configuration File](#update-tlsssl-certificate-in-service-configuration-file)
56+
5. [Import TLS/SSL Certification Authority](#import-tlsssl-certification-authority)
5757

5858
### To use an existing certificate from the certificate store
59-
1. [Export SSL Certificate From Certificate Store](#export-ssl-certificate-from-certificate-store)
60-
2. [Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
61-
3. [Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
59+
1. [Export TLS/SSL Certificate From Certificate Store](#export-tlsssl-certificate-from-certificate-store)
60+
2. [Upload TLS/SSL Certificate to Cloud Service](#upload-tlsssl-certificate-to-cloud-service)
61+
3. [Update TLS/SSL Certificate in Service Configuration File](#update-tlsssl-certificate-in-service-configuration-file)
6262

6363
### To use an existing certificate in a PFX file
64-
1. [Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
65-
2. [Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
64+
1. [Upload TLS/SSL Certificate to Cloud Service](#upload-tlsssl-certificate-to-cloud-service)
65+
2. [Update TLS/SSL Certificate in Service Configuration File](#update-tlsssl-certificate-in-service-configuration-file)
6666

6767
## To configure client certificates
6868
Client certificates are required in order to authenticate requests to the service. Choose the most applicable of the three scenarios below, and execute all its steps:
@@ -96,7 +96,7 @@ A certificate is required to encrypt the credentials that are stored in the meta
9696

9797
### Use a new self-signed certificate
9898
1. [Create a Self-Signed Certificate](#create-a-self-signed-certificate)
99-
2. [Create PFX file for Self-Signed Encryption Certificate](#create-pfx-file-for-self-signed-ssl-certificate)
99+
2. [Create PFX file for Self-Signed Encryption Certificate](#create-pfx-file-for-self-signed-tlsssl-certificate)
100100
3. [Upload Encryption Certificate to Cloud Service](#upload-encryption-certificate-to-cloud-service)
101101
4. [Update Encryption Certificate in Service Configuration File](#update-encryption-certificate-in-service-configuration-file)
102102

@@ -180,7 +180,7 @@ Refer to the documentation for Dynamic IP Security in IIS for other supported va
180180
## Operations for configuring service certificates
181181
This topic is for reference only. Follow the configuration steps outlined in:
182182

183-
* Configure the SSL certificate
183+
* Configure the TLS/SSL certificate
184184
* Configure client certificates
185185

186186
## Create a self-signed certificate
@@ -199,7 +199,7 @@ To customize:
199199
* -e with the certificate expiration date
200200
Create a strong password and specify it when prompted.
201201

202-
## Create PFX file for self-signed SSL certificate
202+
## Create PFX file for self-signed TLS/SSL certificate
203203
Execute:
204204

205205
pvk2pfx -pvk MySSL.pvk -spc MySSL.cer
@@ -209,25 +209,25 @@ Enter password and then export certificate with these options:
209209
* Yes, export the private key
210210
* Export all extended properties
211211

212-
## Export SSL certificate from certificate store
212+
## Export TLS/SSL certificate from certificate store
213213
* Find certificate
214214
* Click Actions -> All tasks -> Export…
215215
* Export certificate into a .PFX file with these options:
216216
* Yes, export the private key
217217
* Include all certificates in the certification path if possible
218218
*Export all extended properties
219219

220-
## Upload SSL certificate to cloud service
221-
Upload certificate with the existing or generated .PFX file with the SSL key pair:
220+
## Upload TLS/SSL certificate to cloud service
221+
Upload certificate with the existing or generated .PFX file with the TLS key pair:
222222

223223
* Enter the password protecting the private key information
224224

225-
## Update SSL certificate in service configuration file
225+
## Update TLS/SSL certificate in service configuration file
226226
Update the thumbprint value of the following setting in the service configuration file with the thumbprint of the certificate uploaded to the cloud service:
227227

228228
<Certificate name="SSL" thumbprint="" thumbprintAlgorithm="sha1" />
229229

230-
## Import SSL certification authority
230+
## Import TLS/SSL certification authority
231231
Follow these steps in all account/machine that will communicate with the service:
232232

233233
* Double-click the .CER file in Windows Explorer
@@ -244,7 +244,7 @@ Change these settings to false in the service configuration file to turn off the
244244
<Setting name="SetupWebserverForClientCertificates" value="false" />
245245
```
246246

247-
Then, copy the same thumbprint as the SSL certificate in the CA certificate setting:
247+
Then, copy the same thumbprint as the TLS/SSL certificate in the CA certificate setting:
248248

249249
```xml
250250
<Certificate name="CA" thumbprint="" thumbprintAlgorithm="sha1" />
@@ -407,7 +407,7 @@ Update the thumbprint value of the following settings in the service configurati
407407
```
408408

409409
## Common certificate operations
410-
* Configure the SSL certificate
410+
* Configure the TLS/SSL certificate
411411
* Configure client certificates
412412

413413
## Find certificate
@@ -473,7 +473,7 @@ In the [Azure portal](https://portal.azure.com/)
473473
7. Once completed, copy the certificate thumbprint from the new entry in the list.
474474

475475
## Other security considerations
476-
The SSL settings described in this document encrypt communication between the service and its clients when the HTTPS endpoint is used. This is important since credentials for database access and potentially other sensitive information are contained in the communication. Note, however, that the service persists internal status, including credentials, in its internal tables in the Microsoft Azure SQL database that you have provided for metadata storage in your Microsoft Azure subscription. That database was defined as part of the following setting in your service configuration file (.CSCFG file):
476+
The TLS settings described in this document encrypt communication between the service and its clients when the HTTPS endpoint is used. This is important since credentials for database access and potentially other sensitive information are contained in the communication. Note, however, that the service persists internal status, including credentials, in its internal tables in the Microsoft Azure SQL database that you have provided for metadata storage in your Microsoft Azure subscription. That database was defined as part of the following setting in your service configuration file (.CSCFG file):
477477

478478
```xml
479479
<Setting name="ElasticScaleMetadata" value="Server=…" />

0 commit comments

Comments
 (0)