Upravit

Sdílet prostřednictvím


SQL Server Native Client Configuration Properties (Flags Tab)

Applies to: SQL Server - Windows only

Microsoft SQL Server clients on this machine, communicate with SQL Server servers using the protocols provided in the SQL Server Native Client library file. This page configures the client computer to request an encrypted connection using Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL). If an encrypted connection cannot be established, the connection fails.

The sign-in process is always encrypted. The options in this article apply only to encrypting data. For more information about how SQL Server encrypts communication and for instructions on how to configure the client to trust the root authority of the server certificate, see "Encrypting Connections to SQL Server" and "How to: Enable Encrypted Connections to the Database Engine ( SQL Server Configuration Manager)" in SQL Server Books Online.

Important

SQL Server Native Client (SNAC) isn't shipped with:

  • SQL Server 2022 (16.x) and later versions
  • SQL Server Management Studio 19 and later versions

The SQL Server Native Client (SQLNCLI or SQLNCLI11) and the legacy Microsoft OLE DB Provider for SQL Server (SQLOLEDB) aren't recommended for new application development.

For new projects, use one of the following drivers:

For SQLNCLI that ships as a component of SQL Server Database Engine (versions 2012 through 2019), see this Support Lifecycle exception.

Options

Force protocol encryption
Request a connection using TLS.

Trust Server Certificate
When set to No, the client process attempts to validate the server certificate. The client and server must each have a certificate issued from a public certification authority. If the certificate is not present on the client computer, or if the validation of the certificate fails, the connection is terminated.

When set to Yes, the client does not validate the server certificate, enabling the use of a self-signed certificate.

Trust Server Certificate is only available if Force protocol encryption is set to Yes.