Configuring TLS 1.3 on Microsoft SQL Server during upgrade and runtime
You can establish a secure connection between Sterling B2B Integrator and Microsoft SQL Server using TLS 1.3 during upgrade and runtime.
Restriction:
- Installing Sterling B2B Integrator using TLS 1.3 connection is unsupported.
- For upgrades, TLS 1.3 can only be configured if you are upgrading from Sterling B2B Integrator v6.2.0.0 to v6.2.0.1 or higher.
Minimum Requirements
The following minimum requirements must be met to enable TLS 1.3:
- Microsoft SQL Server 2022 Cumulative Update 6. For more information, see Cumulative Update 6 for SQL Server 2022.
- Microsoft JDBC Driver 12.4 for SQL Server. Download and install the driver from the Microsoft Website.
- Refer to TLS Cipher Suites in Windows Server 2022 for the list of supported TLS 1.3 Cipher Suites.
- Force Strict Encryption must be enabled on the database server to activate TDS 8.0 protocol. For information on strict encryption limitations, see Features that don't support strict encryption.
Configuring TLS 1.3 with Trust Server Certificate Enabled
- Update the property useSSL to true in
sandbox.cfg
. - Add the following parameters to
sandbox.cfg
:trustServerCertificate=true tls_version=TLSv1.3 encrypt=strict
- Run the command based on your operating system:
- Unix/Linux:
setupfiles.sh
- Windows:
setupfiles.cmd
- Unix/Linux:
Configuring TLS 1.3 with Trust Server Certificate Disabled
- Update the property useSSL to true in
sandbox.cfg
. - Add the following parameters to
sandbox.cfg
:trustServerCertificate=false hostNameInCertificate=<Host name of the database server> trustStore=<File path of the truststore JKS> trustStorePassword=<Password for the truststore> tls_version=TLSv1.3 encrypt=strict
- Run the command based on your operating system:
- Unix/Linux:
setupfiles.sh
- Windows:
setupfiles.cmd
- Unix/Linux: