Force SQL Server to use CA certificate - sql-server

I have imported an SSL certificate from entrust. The certificate is visible in IIS and the site can be accessed with SSL so I know the certificate is good.
However i want to use the certificate to encrypt the connection to the sql server. The certificate is not shown in sql config manager as i believe the issued to name doesn't match my host name.
My server name is for example zserver.z1 but i access the server with a dns name of dbserver.company.net. As i will be accessing the server with the dns name, is it possible to force the certificate?
When i created the certificate request, i did specify the dns name as my server name but it doesnt show it on the certificate. Maybe i should contact entrust, but i thought there may be a registry fix out there hopefully!

unfortunately i could not make sql read the other certificate, i was able to reapply for certificate without charges for the local server address and this is now viewable in sql config manager.

Related

Limit web app users for always encrypted certificate

Using SQL 2019 Always Encrypted Columns and MVC.NET with IIS 10 need to validate if domain users have certificate installed on their local machines
Steps already done but not working
Create Master Key saved into database Server local machine certificate
Grant IIS_IUSRS read permission to read private keys of certificate
Change application pool user to run using Network Services
Access application from URL with user doesn't have certificate and data shown as plain text
Is there any way to make sure that only domain users with valid certificate (using export and import from MMC) will see data as plain text?

Cannot access my ssrs server using my dns name on Azure VM

I have SSRS running on my Azure VM, I want to access my SSRS Server Portal through my DNS name with an https. I already deploy add configure my https using a certificate that I already generate using let's encrypt and a different port. FYI this certificate is used by my Website too. But when I try to access my SSRS using an https and my DNS name, but it won't connect, its return site can't be reached. I already add inbound rules to my port too. But when I try to connect from my Ip and Http It will connect. What did I miss?
I found the answer, I need to add my Inbound port in my azure Network Security Group

Active Directory 2008R2 Serving Invalid TLS Certificate Over LDAP

I am creating a simple client to connect to the LDAP servers running on one of my windows 2008R2 Active Directory Domain Controllers.
I have successfully connected to the LDAP server over a non TLS connection. However, whenever I attempt to make a TLS connection, the handshake fails. After some digging, and downloading the certificate using the following command:
openssl s_client -connect <domain controller>:636
I found that the certificate being served from the LDAP server is invalid. I can see that the certificate is signed by our CA and my local system, that runs the application already has this trust established with the CA. However, It is missing all of the subject information in the certificate. The client application does not allow for this.
After speaking with the administrator, he indicated that the certificates being generated for the domain controller systems to serve TLS certificates over LDAP is automatic and is created by our internal Microsoft Certificate Server. He was not sure how to address this.
After numerous Google searches, I have come up pretty empty on how to resolve this. Is it something that is addressed on the certificate server? Is it something on the domain controller which is stripping the subject information? Is it some setting or configuration? Since, I do not have direct access to these systems I am at a loss on where to begin.
Any assistance would be appreciated.
Blindly trusting a certificate that is invalid is not an acceptable solution.
Ask your admin to export the root certificate for your environment (like, to a .cer file). Then you can use that file to add it as a trusted root certificate on the computer that needs to access it.
That's how we do it in our environment when we've needed to access an external domain over LDAPS.
Of course, that only works if the application accessing LDAPS uses the Windows certificate store. Some applications, like Java-based apps, don't, and you need to do it another way.
I was able to assist my Admin with updating the template the certificate server was using to include the subject and subject alternate name.
I found the following articles that helped determine the problem
https://blogs.msdn.microsoft.com/microsoftrservertigerteam/2017/04/10/step-by-step-guide-to-setup-ldaps-on-windows-server/
https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx
https://support.microsoft.com/en-us/help/931351/how-to-add-a-subject-alternative-name-to-a-secure-ldap-certificate
Ultimately going over each setting until we found the right solution that solved the problem of why the certificate server was sending and invalid certificate.

The report server cannot open a connection to the report server database.

I try to configure Reporting Server without selecting SSL Certificate for MS SQL Server. Can any body tell me that is that possible to deploy SSRS Report for testing purpose if I dont have SSL Certificate information. Because I am getting below error!
"The report server cannot open a connection to the report server database. A connection to the database is required for all requests and processing. (rsReportServerDatabaseUnavailable)"
.
Thanks in advance.
You can remove a certificate if one is applied to the service endpoint.
Open Reporing Service Configuration Manager.
under the targeted ssrs instance, navigate to the "Web Sercvices Url".
Make sure the SSL certificate is set to
Save the settings.
Also, make sure the database configured under the "Database" node is accesible from your SSRS instance.
Make sure the database is configured correctly in reporting services configuration manager.
If you updated the service account after the installation you probably want to use SQL Server Configuration Manager to update the account as it also sets the required permissions.
Regarding the SSL - reporting services encrypts the database using this certificate. as long as you are not importing the database or recovering from backup you can use the autogenerated certificate and deploy your projects from SSMS.

SQL Server Force Encryption with a DoD Certificate

I have a SQL Server 2012 Standard hosted on a WIN 2008 R2 DataCenter 64 bit. I have a requirement to set the Force Encryption on the SQL Server to Yes, which is easy to do.
What I am needing help with is for the DoD Certificate requirement, where do I get the DoD Certificate from? and Do I just install it on the server where SQL Server resides?
I found this link , I wonder if I can use this:
http://dodpki.c3pki.chamb.disa.mil/rootca.html
Your hyperlink is not publicly available, however, since the name on the file is rootca.html it may contain information about how to get a root CA Certificate provisioned. When you use SQL Server Configuration Manager to set force encryption to true, you must either configure a certificate to use or the server will used a self signed certificate. The security concern with only setting this option and using a self signed certificate is that it leaves your server vulnerable to a man in the middle attack. The requirements for creating the certificate to be used for encrypting connections are on MSDN. I would recommend at least using a domain certificate generated by the domain certificate authority. You probably need to adhere to standards if this is for the DOD. Once the certificate and related private key are generated, they need to be added to the certificate store of the service account running the SQL Server database engine. After that, it can be selected for use in the configuration manager in the same dialog box as the force encryption option under a different tab. Once this is configured and the service is restarted, you can verify that the connections are encrypted by using the sql statement below:
select * from sys.dm_exec_connections

Resources