Skip to content

Commit 5b2292c

Browse files
authored
Merge pull request #33936 from MicrosoftDocs/main
4/25/2025 PM Publish
2 parents e2bb677 + d526f37 commit 5b2292c

19 files changed

+79
-408
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49401,6 +49401,26 @@
4940149401
"redirect_url": "/sql/dma/dma-overview",
4940249402
"redirect_document_id": false
4940349403
},
49404+
{
49405+
"source_path": "docs/sql-server/azure-arc/connect-at-scale-script.md",
49406+
"redirect_url": "/sql/sql-server/azure-arc/deployment-options",
49407+
"redirect_document_id": false
49408+
},
49409+
{
49410+
"source_path": "docs/sql-server/azure-arc/connect-with-installer.md",
49411+
"redirect_url": "/sql/sql-server/azure-arc/deployment-options",
49412+
"redirect_document_id": false
49413+
},
49414+
{
49415+
"source_path": "docs/sql-server/azure-arc/onboard-configuration-manager-custom-task.md",
49416+
"redirect_url": "/sql/sql-server/azure-arc/deployment-options",
49417+
"redirect_document_id": false
49418+
},
49419+
{
49420+
"source_path": "docs/sql-server/azure-arc/automatically-connect.md",
49421+
"redirect_url": "/sql/sql-server/azure-arc/deployment-options",
49422+
"redirect_document_id": false
49423+
},
4940449424
{
4940549425
"source_path": "docs/sql-server/azure-arc/view-databases.md",
4940649426
"redirect_url": "/sql/sql-server/azure-arc/view-inventory",
Lines changed: 35 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,91 @@
11
---
22
title: Certificate rotation
33
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
4-
description: Learn about the upcoming changes of root certificate changes that will affect Azure SQL Database and Azure SQL Managed Instance
4+
description: Learn about the upcoming changes of root certificate changes that will affect Azure SQL Database & Azure SQL Managed Instance
55
author: tameikal-msft
66
ms.author: talawren
77
ms.reviewer: mathoma, vanto
8-
ms.date: 10/11/2023
8+
ms.date: 04/24/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: concept-article
1212
---
1313

14-
# Understanding the changes in the Root CA change for Azure SQL Database & SQL Managed Instance
14+
# Understanding the changes in the Root CA change for Azure SQL Database & Azure SQL Managed Instance
1515

16-
Azure SQL Database & SQL Managed Instance will be changing the root certificate for the client application/driver enabled with Secured Sockets Layer (SSL) or Transport Layer Security (TLS), used to establish secure TDS connection. The [current root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) is set to expire October 26, 2020 as part of standard maintenance and security best practices. This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
16+
Azure SQL Database & Azure SQL Managed Instance will be changing the root certificate for the client application/driver enabled with Secured Sockets Layer (SSL) or Transport Layer Security (TLS), used to establish secure TDS connection. To get the latest list of root certificate authority details, see [Azure Certificate Authority details](/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list). This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
1717

1818
## What update is going to happen?
1919

20-
[Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
20+
[Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be noncompliant.
2121

22-
As per the industry's compliance requirements, CA vendors began revoking CA certificates for non-compliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since Azure SQL Database & SQL Managed Instance currently use one of these non-compliant certificates, which client applications use to validate their TLS connections, we need to ensure that appropriate actions are taken (described below) to minimize the potential impact to your Azure SQL servers.
22+
As per the industry's compliance requirements, CA vendors began revoking CA certificates for noncompliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since SQL Database & SQL Managed Instance currently use one of these noncompliant certificates, which client applications use to validate their TLS connections, we need to ensure that appropriate actions are taken to minimize the potential impact to your Azure SQL servers.
2323

24-
The new certificate will be used starting October 26, 2020. If you use full validation of the server certificate when connecting from a SQL client (TrustServerCertificate=false), you need to ensure that your SQL client would be able to validate new root certificate before October 26, 2020.
24+
If you use full validation of the server certificate when connecting from a SQL client (`TrustServerCertificate=false`), you need to ensure that your SQL client would be able to validate new root certificate listed in [Root Certificate Authorities](/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list#root-certificate-authorities).
2525

2626
## How do I know if my application might be affected?
2727

2828
All applications that use SSL/TLS and verify the root certificate needs to update the root certificate in order to connect to Azure SQL Database & Azure SQL Managed Instance.
2929

30-
If you aren't using SSL/TLS currently, there's no impact to your application availability. You can verify if your client application is trying to verify root certificate by looking at the connection string. If TrustServerCertificate is explicitly set to true, then you aren't affected.
30+
If you aren't using SSL/TLS currently, there's no impact to your application availability. You can verify if your client application is trying to verify root certificate by looking at the connection string. If `TrustServerCertificate` is explicitly set to true, then you aren't affected.
3131

32-
If your client driver utilizes OS certificate store, as majority of drivers do, and your OS is regularly maintained this change will likely not affect you, as the root certificate we are switching to should be already available in your Trusted Root Certificate Store. Check for Baltimore CyberTrust Root and DigiCert GlobalRoot G2 Root, and validate it is present.
32+
If your client driver utilizes OS certificate store, as most drivers do, and your OS is regularly maintained this change will likely not affect you, as the root certificate we're switching to should be already available in your Trusted Root Certificate Store. Check the [Root Certificate Authorities](/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list#root-certificate-authorities) list and validate one of the certificates is present in your Trusted Root Certificate Store.
3333

3434
If your client driver utilizes local file certificate store, to avoid your application's availability being interrupted due to certificates being unexpectedly revoked, or to update a certificate, which has been revoked, refer to the [**What do I need to do to maintain connectivity**](./ssl-root-certificate-expiring.md#what-do-i-need-to-do-to-maintain-connectivity) section.
3535

3636
## What do I need to do to maintain connectivity
3737

3838
To avoid your application's availability being interrupted due to certificates being unexpectedly revoked, or to update a certificate which has been revoked, follow these steps:
3939

40-
* Download Baltimore CyberTrust Root & DigiCert GlobalRoot G2 Root CA:
41-
* https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem
42-
* https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem
40+
- Download the following certificates from [Root Certificate Authorities](/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list#root-certificate-authorities).
41+
- DigiCert Global Root G2
42+
- Microsoft ECC Root Certificate Authority 2017
43+
- Microsoft RSA Root Certificate Authority 2017
4344

44-
* Generate a combined CA certificate store with both **BaltimoreCyberTrustRoot** and **DigiCertGlobalRootG2** certificates are included.
45+
- Import the certificates into the Trusted Root Certificate Store on the client machine. The steps to import the certificate depend on the operating system and the client driver you're using. For example, if you're using Windows, you can use the Microsoft Management Console (MMC) to import the certificate into the Trusted Root Certification Authorities store.
4546

4647
## What can be the impact?
47-
If you are validating server certificates as documented here, your application's availability might be interrupted since the database won't be reachable. Depending on your application, you can receive a variety of error messages, including but not limited to:
48+
49+
If you're validating server certificates as documented here, your application's availability might be interrupted since the database won't be reachable. Depending on your application, you can receive various error messages, including but not limited to:
4850

4951
- Invalid certificate/revoked certificate
5052
- Connection timed out
5153
- Error if applicable
5254

5355
## Frequently asked questions
5456

55-
### If I am not using SSL/TLS, do I still need to update the root CA?
57+
### If I'm not using SSL/TLS, do I still need to update the root CA?
58+
5659
No actions regarding this change are required if you aren't using SSL/TLS. Still you should set a plan for start using latest TLS version as we plan for TLS enforcement in near future.
5760

58-
### What will happen if I don't update the root certificate before October 26, 2020?
59-
If you don't update the root certificate before November 30, 2020, your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to the Azure SQL Database & SQL Managed Instance and application will experience connectivity issues to your Azure SQL Database & SQL Managed Instance.
61+
### What will happen if I don't update the root certificate when a certificate has expired?
62+
63+
If you don't update the root certificate before it expires, your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to SQL Database & SQL Managed Instance and application will experience connectivity issues to your SQL Database & SQL Managed Instance.
64+
65+
### Do I need to plan a maintenance downtime for this change?
6066

61-
### Do I need to plan a maintenance downtime for this change?<BR>
6267
No. Since the change is only on the client side to connect to the server, there's no maintenance downtime needed here for this change.
6368

64-
### What if I can't get a scheduled downtime for this change before October 26, 2020?
69+
### What if I can't get a scheduled downtime for this change?
70+
6571
Since the clients used for connecting to the server needs to be updating the certificate information as described in the fix section [here](./ssl-root-certificate-expiring.md#what-do-i-need-to-do-to-maintain-connectivity), we don't need to a downtime for the server in this case.
6672

6773
### If I create a new server after November 30, 2020, will I be impacted?
68-
For servers created after October 26, 2020, you can use the newly issued certificate for your applications to connect using SSL/TLS.
74+
75+
For new servers, you can use the newly issued certificate for your applications to connect using SSL/TLS.
6976

7077
### How often does Microsoft update their certificates or what is the expiry policy?
71-
These certificates used by Azure SQL Database & SQL Managed Instance are provided by trusted Certificate Authorities (CA). So the support of these certificates on Azure SQL Database & SQL Managed Instance is tied to the support of these certificates by CA. However, as in this case, there can be unforeseen bugs in these predefined certificates, which need to be fixed at the earliest.
7278

73-
### If I am using read replicas, do I need to perform this update only on primary server or all the read replicas?
74-
Since this update is a client-side change, if the client used to read data from the replica server, we'll need to apply the changes for those clients as well.
79+
These certificates used by SQL Database & SQL Managed Instance are provided by trusted Certificate Authorities (CA). So the support of these certificates on SQL Database & SQL Managed Instance is tied to the support of these certificates by CA. However, as in this case, there can be unforeseen bugs in these predefined certificates, which need to be fixed at the earliest.
80+
81+
### If I'm using read replicas, do I need to perform this update only on primary server or all the read replicas?
82+
83+
Since this update is a client-side change, if the client used to read data from the replica server, we need to apply the changes for those clients as well.
7584

7685
### Do we have server-side query to verify if SSL/TLS is being used?
77-
Since this configuration is client-side, information is not available on server side.
86+
87+
Since this configuration is client-side, information isn't available on server side.
7888

7989
### What if I have further questions?
90+
8091
If you have a support plan and you need technical help, create Azure support request, see [How to create Azure support request](/azure/azure-portal/supportability/how-to-create-azure-support-request).

docs/sql-server/azure-arc/automatically-connect.md

Lines changed: 0 additions & 71 deletions
This file was deleted.

docs/sql-server/azure-arc/configure-advanced-data-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ For more information, see [Extension management with Azure Arc](/azure/azure-arc
5454
1. Click on the **Microsoft Defender for Cloud** tile. If Enablement Status shows **Disabled at the subscription-level**, follow the steps documented in [Enable Microsoft Defender for SQL servers on machines](/azure/defender-for-cloud/defender-for-sql-usage#step-3-enable-the-optional-plan-in-defender-for-clouds-environment-settings-page).
5555

5656
> [!NOTE]
57-
> The first scan to generate the vulnerability assessment happens within 24 hours after enabling Microsoft Defender for Cloud. After that, auto scans are be performed every week on Sunday.
57+
> The first scan to generate the vulnerability assessment happens within 24 hours after enabling Microsoft Defender for Cloud. Successive scans run automatically every Sunday.
5858
5959
## Explore
6060

@@ -77,5 +77,5 @@ Explore security anomalies and threats in Azure Security Center.
7777
:::image type="content" source="media/configure-advanced-data-security/brute-force-alert-mitigation.png" alt-text="Screenshot showing alert mitigation.":::
7878

7979
## Next steps
80-
- [Automatically connect your SQL Server to Azure Arc](automatically-connect.md)
80+
- [SQL Server enabled by Azure Arc deployment options](deployment-options.md)
8181
- You can further investigate the security alerts and attacks using [Azure Sentinel](/azure/sentinel/overview). For details, see [on-board Azure Sentinel](/azure/sentinel/connect-data-sources).

0 commit comments

Comments
 (0)