Hi Sourav,
Thank you for posting query in Microsoft Q&A Platform.
Yes, ADF uses outbound port 443 to connect to external services, including SQL databases.
To allow outbound traffic on port 443, you need to configure the outbound rules in the network security group (NSG) associated with the self-hosted integration runtime (SHIR) VM. You can add a rule to allow outbound traffic on port 443 to the IP address range of the SQL database.
The SQL database should also expose port 443 for ADF to connect to it securely. You can configure the SQL database to use TLS encryption to secure the connection. You can enable TLS settings in Azure by configuring the TLS version in the Azure SQL database firewall settings.
Data will be encrypted during transit and at rest in ADF and ADLS. ADF uses HTTPS to encrypt data in transit, and ADLS uses Azure Storage Service Encryption (SSE) to encrypt data at rest. You can also enable client-side encryption in ADF to encrypt data before it is sent to ADLS.
To configure TLS settings in the self-hosted agent, you need to configure the TLS version in the Java Virtual Machine (JVM) used by the agent. You can do this by setting the JVM system properties for TLS.
You do not need to store the TLS key/certificate in Azure. The TLS key/certificate is used to secure the connection between ADF and the SQL database, and it should be stored securely on the SQL database server.