You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/single-server/concepts-certificate-rotation.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Starting October 2022, the [BaltimoreCyberTrustRoot root certificate](https://ww
30
30
31
31
## Do I need to make any changes on my client to maintain connectivity?
32
32
33
-
There are no code or application changes required on client side. if you follow our previous recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate is not removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
33
+
There are no code or application changes required on client side. if you follow our previous recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate isn't removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
34
34
35
35
### Previous Recommendation
36
36
@@ -57,11 +57,11 @@ There are no code or application changes required on client side. if you follow
* For .NET (Npgsql) users on Windows, make sure **Baltimore CyberTrust Root** and **DigiCert Global Root G2** both exist in Windows Certificate Store, Trusted Root Certification Authorities. If any certificates do not exist, import the missing certificate.
60
+
* For .NET (Npgsql) users on Windows, make sure **Baltimore CyberTrust Root** and **DigiCert Global Root G2** both exist in Windows Certificate Store, Trusted Root Certification Authorities. If any certificates don't exist, import the missing certificate.
61
61
62
62

63
63
64
-
* For .NET (Npgsql) users on Linux using SSL_CERT_DIR, make sure **BaltimoreCyberTrustRoot** and **DigiCertGlobalRootG2** both exist in the directory indicated by SSL_CERT_DIR. If any certificates do not exist, create the missing certificate file.
64
+
* For .NET (Npgsql) users on Linux using SSL_CERT_DIR, make sure **BaltimoreCyberTrustRoot** and **DigiCertGlobalRootG2** both exist in the directory indicated by SSL_CERT_DIR. If any certificates don't exist, create the missing certificate file.
65
65
66
66
* For other PostgreSQL client users, you can merge two CA certificate files like this format below
67
67
@@ -76,7 +76,7 @@ There are no code or application changes required on client side. if you follow
76
76
* In future, after the new certificate deployed on the server side, you can change your CA pem file to DigiCertGlobalRootG2.crt.pem.
77
77
78
78
> [!NOTE]
79
-
> Please do not drop or alter **Baltimore certificate**until the cert change is made. We will send a communication once the change is done, after which it is safe for them to drop the Baltimore certificate.
79
+
> Please don't drop or alter **Baltimore certificate** until the cert change is made. We will send a communication once the change is done, after which it is safe for them to drop the Baltimore certificate.
80
80
81
81
## What if we removed the BaltimoreCyberTrustRoot certificate?
82
82
@@ -86,18 +86,18 @@ You will start to connectivity errors while connecting to your Azure Database fo
86
86
87
87
### 1. If I am not using SSL/TLS, do I still need to update the root CA?
88
88
89
-
No actions required if you are not using SSL/TLS.
89
+
No actions required if you aren't using SSL/TLS.
90
90
91
91
### 2. If I am using SSL/TLS, do I need to restart my database server to update the root CA?
92
92
93
-
No, you do not need to restart the database server to start using the new certificate. This is a client-side change and the incoming client connections need to use the new certificate to ensure that they can connect to the database server.
93
+
No, you don't need to restart the database server to start using the new certificate. This is a client-side change and the incoming client connections need to use the new certificate to ensure that they can connect to the database server.
94
94
95
95
### 3. How do I know if I'm using SSL/TLS with root certificate verification?
96
96
97
97
You can identify whether your connections verify the root certificate by reviewing your connection string.
98
98
- If your connection string includes `sslmode=verify-ca` or `sslmode=verify-full`, you need to update the certificate.
99
99
- If your connection string includes `sslmode=disable`, `sslmode=allow`, `sslmode=prefer`, or `sslmode=require`, you do not need to update certificates.
100
-
- If your connection string does not specify sslmode, you do not need to update certificates.
100
+
- If your connection string doesn't specify sslmode, you don't need to update certificates.
101
101
102
102
If you are using a client that abstracts the connection string away, review the client's documentation to understand whether it verifies certificates. To understand PostgreSQL sslmode review the [SSL mode descriptions](https://www.postgresql.org/docs/11/libpq-ssl.html#ssl-mode-descriptions) in PostgreSQL documentation.
103
103
@@ -119,7 +119,7 @@ For connector using Self-hosted Integration Runtime where you explicitly include
119
119
120
120
### 7. Do I need to plan a database server maintenance downtime for this change?
121
121
122
-
No. Since the change here is only on the client side to connect to the database server, there is no maintenance downtime needed for the database server for this change.
122
+
No. Since the change here is only on the client side to connect to the database server, there's no maintenance downtime needed for the database server for this change.
123
123
124
124
### 8. If I create a new server after October 2022 (10/2022), will I be impacted?
125
125
For servers created after October 2022 (10/2022), you will continue to use the [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) together with new [DigiCertGlobalRootG2] (https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem) root certificates in your database client SSL certificate store for your applications to connect using SSL.
@@ -138,7 +138,7 @@ To verify if you are using SSL connection to connect to the server refer [SSL ve
138
138
139
139
### 12. Is there an action needed if I already have the DigiCertGlobalRootG2 in my certificate file?
140
140
141
-
No. There is no action needed if your certificate file already has the **DigiCertGlobalRootG2**.
141
+
No. There's no action needed if your certificate file already has the **DigiCertGlobalRootG2**.
142
142
143
143
### 13. What if you are using docker image of PgBouncer sidecar provided by Microsoft?
144
144
A new docker image which supports both [**Baltimore**](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) and [**DigiCert**](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem) is published to below [here](https://hub.docker.com/_/microsoft-azure-oss-db-tools-pgbouncer-sidecar) (Latest tag). You can pull this new image to avoid any interruption in connectivity starting October, 2022.
0 commit comments