Yes, all of our Microsoft SQL Server and MySQL-based servers support encrypted connections. These SSL/TLS connections protect credentials, queries, and result sets as they travel across the network. However, your client, application, or driver must explicitly support and request encrypted connections for them to be used.
Encrypted database connections defend against network eavesdropping and man-in-the-middle attacks. In shared hosting or cloud environments, this protection is especially important because traffic may traverse public or semi-public network segments. Our management utilities are preconfigured to use SSL, and common development stacks provide simple parameters to enforce encryption.
#Supported Clients and Management Tools
Most modern database clients can initiate encrypted sessions. Enable the feature in the connection dialog or via configuration settings. The following tools are confirmed to work with our encrypted SQL Server and MySQL endpoints.
- Microsoft's SQL Server Management Studio (SSMS) fully supports encrypted connections. Check the "Encrypt connection" box on the Connection Properties tab when creating a new server registration.
- Navicat for SQL Server and MySQL includes dedicated SSL tabs in the connection editor where you can enable encryption and optionally supply client certificates.
- Our online management utilities such as MyLittleBackup, MyLittleAdmin, and PHPMyAdmin all connect using SSL with no additional configuration required on your part.
#Implementing Encrypted Connections in Code
Development technologies such as ASP.NET, .NET, and PHP support SSL encrypted connections through connection string parameters or API flags. Always specify encryption explicitly rather than relying on server defaults. This guarantees protection even if server-side enforcement changes.
#.NET and ASP.NET Connection String
string connectionString = "Server=[your-sql-server];Database=[your-database];User Id=[username];Password=[password];Encrypt=True;TrustServerCertificate=False;"
The Encrypt=True directive instructs the SqlClient provider to use TLS. Set TrustServerCertificate=False to ensure the server certificate is validated against a trusted root. Install any required CA certificates in your application server's certificate store.
#PHP and MySQL SSL Configuration
$mysqli = mysqli_init();
mysqli_ssl_set($mysqli, null, null, null, null, null);
mysqli_real_connect($mysqli, "[hostname]", "[username]", "[password]", "[database]", 3306, null, MYSQLI_CLIENT_SSL);
For PDO, add PDO::MYSQL_ATTR_SSL_CA and PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT options. Update your MySQL client library if you encounter protocol or cipher suite errors.
#Common Pitfalls and Troubleshooting
- Driver or library version too old to support current TLS protocols. Update to the latest stable release of the .NET Framework, MySQL Connector/NET, or PHP mysqlnd.
- Certificate trust failures produce handshake errors. Verify that your client trusts the certificate authority used by our database servers or temporarily set TrustServerCertificate=True for testing.
- Forgetting to update connection strings after copying from non-SSL examples, resulting in plaintext fallback. Always test with a packet analyzer or the client's verbose logging.
If connections fail after enabling encryption, check the exact error message. Most describe the failure reason clearly, such as "The certificate chain was issued by an authority that is not trusted" or "SSL connection is required but the server does not support it."
#Practical Takeaway
Enable encrypted connections on every SQL Server and MySQL client and application you control. The performance impact is negligible on modern hardware while the security benefit is substantial. Review your existing connection strings and management tool profiles today, then consult our database connection guides for environment-specific steps and certificate download links.
Comments
No comments yet