An Azure relational database service.
Hello Rajeskumar S L, this setup will work but there are a few caveats to keep in mind:
- Protocol support
- .NET 4.8’s built-in System.Data.SqlClient driver speaks up through TDS 7.4 only.
- SQL Server 2025 continues to support legacy TDS 7.x handshakes alongside the new TDS 8.0 protocol—it doesn’t drop backward-compatible support for older clients.
- Configuration for legacy clients
- By default, SQL Server 2025 with “Force Strict Encryption = Yes” kicks clients into TDS 8.0 (strict always-encrypted mode).
- Setting Force Strict Encryption = No (i.e. optional encryption) lets your .NET 4.8 apps connect via TDS 7.4 while still allowing TLS 1.2.
- Just be sure your Windows Server Schannel configuration enables TLS 1.2 (but you can leave TLS 1.3 enabled for newer clients).
- Support lifecycle
- Microsoft fully supports this backward-compatibility mode for the life of SQL Server 2025 and Windows Server 2025. You won’t fall outside any supported configuration as long as you stay on supported OS/SQL builds and keep TLS 1.2 patched.
- The only risk is if you ever disable TLS 1.2 or remove cipher suites that your .NET 4.8 apps need—.NET 4.8 does not support TLS 1.3, so it will fail if 1.2 isn’t available.
Known risks & tips
- .NET 4.8 won’t negotiate TLS 1.3. If you ever turn off TLS 1.2 at the OS level, your legacy apps will break.
- Review your cipher-suite ordering to ensure a strong TLS 1.2 suite is offered to older clients.
- Consider moving legacy apps to the newer Microsoft.Data.SqlClient when you can—it supports TDS 8.0/strict encryption and TLS 1.3.
Hope this helps get your migration moving smoothly!
Reference list