To increase link security, you can enable Secure Sockets Layer (SSL) encryption and install an SSL certificate for necessary application services. SSL is used on the transport layer to encrypt network connections. It increases security and integrity of communication data, but also increases the network connection time.
- Due to the inherent drawbacks of SSL encryption, activating this function significantly increases your CPU usage. We recommend that you only enable SSL encryption for Internet connections requiring encryption. Intranet connections are relatively secure, and generally do not require link encryption.
- In addition, SSL encryption cannot be disabled once it is enabled. Therefore, enable SSL encryption with caution.
- Applicable scope: RDS for SQL Server
Enable SSL encryption
- Log on to the RDS Console.
- Select the region where the target instance is located.
- Click the ID of the target instance to enter the Basic Information page.
- In the left-side navigation pane, click Security to go to the Security page.
- Click the SSL tab.
- Click the button next to Disabled, as shown in the following figure.
- In the SSL Setting dialog box, select the link for which SSL encryption needs to be enabled and click OK to activate SSL encryption, as shown in the following figure.
Note You can choose to encrypt both Internet and intranet links as needed, but only one link can be encrypted.
- Click Download CA Certificate to download an SSL certificate, as shown in the following figure.
The downloaded SSL certificate is a package including the following files:
- p7b file: is used to import the CA certificate on Windows OS.
- PEM file: is used to import the CA certificate on other systems or for other applications.
- JKS file: is a Java truststore certificate file used for importing CA certificate chains in Java programs. The password is apsaradb.
Note When using JKS certificate files in Java, modify default jdk security configurations of jdk7 and jdk8 as follows: In the
jre/lib/security/java.securityfile of the machine that runs the database to be accessed through SSL, modify the following configurations:
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 224 jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024If you do not modify the JDK security configuration, the following error will be reported. Other similar errors are generally caused by Java security configurations.
javax.net.ssl.SSLHandshakeException: DHPublicKey does not comply to algorithm constraints
Configure the SSL CA certificate
After SSL encryption is enabled, you need to configure the SSL CA certificate for applications or clients that access RDS. The following uses MySQL Workbench as an example to describe how to install the SSL CA certificate. For other applications or clients, see their usage instructions.
- Open MySQL Workbench.
- Choose .
- Enable Use SSL and import the SSL CA certificate, as shown in the following figure.