You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Originally posted by potatoqualitee April 11, 2023
Hear ye, hear ye, dbatools 2.0 will be released soon and, unless you encrypt your SQL Server connections, you'll need to make some changes.
Microsoft's SQL Server connection libraries have new defaults so we do too. These library changes also impact the SqlServer module and Azure Data Studio (tho not SSMS yet it seems).
These changes will cause one or more of the following errors when connecting to unencrypted SQL Servers with dbatools 2.0:
The target principal name is incorrect
An existing connection was forcibly closed by the remote host
The certificate chain was issued by an authority that is not trusted
The instance of SQL Server you attempted to connect to does not support encryption
The remote certificate was rejected by the provided RemoteCertificateValidationCallback
To learn how to encrypt your SQL Server connections, check out @ACALVETT's post, Configuring network encryption for SQL Server This is the best way to handle the new changes because these changes will eventually impact all SQL Server-related applications.
The blog post also covers a new command I recently created called Set-DbatoolsInsecureConnection to help address these issues. I'll be using this often in my CI/CD scenarios.
The text was updated successfully, but these errors were encountered:
Discussed in #8855
Originally posted by potatoqualitee April 11, 2023
Hear ye, hear ye, dbatools 2.0 will be released soon and, unless you encrypt your SQL Server connections, you'll need to make some changes.
Microsoft's SQL Server connection libraries have new defaults so we do too. These library changes also impact the SqlServer module and Azure Data Studio (tho not SSMS yet it seems).
These changes will cause one or more of the following errors when connecting to unencrypted SQL Servers with dbatools 2.0:
To learn how to encrypt your SQL Server connections, check out @ACALVETT's post, Configuring network encryption for SQL Server This is the best way to handle the new changes because these changes will eventually impact all SQL Server-related applications.
I also wrote a blog post, New Encryption and Certificate Defaults in Microsoft's SQL Server Connection Provider, that shows less secure ways to manage these changes.
The blog post also covers a new command I recently created called
Set-DbatoolsInsecureConnection
to help address these issues. I'll be using this often in my CI/CD scenarios.The text was updated successfully, but these errors were encountered: