


So, in practice, the minimum versions required are JDK 7u95 and JDK 6u121.Īnother thing to consider is the Cipher Suites available on the client and the server. Note that the standard TLS protocol version names used in the JDK are SSLv3, TLSv1, TLSv1.1 and TLSv1.2. Set the client default protocol version to TLS 1.0. Set the client default protocol versions to TLS 1.0, 1.1 and 1.2. For example, if the value of this property is “TLSv1.1,TLSv1.2”, then the default protocol settings on the client for TLSv1.1 and TLSv1.2 are enabled on the client, while SSLv3, TLSv1, and SSLv2Hello are disabled on the client. To enable specific TLS protocols on the client, specify them in a comma-separated list within quotation marks all other supported protocols are then disabled on the client.

This property was introduced to JDK 7 in 7u95 and to JDK 6 in 6u121. To change the default client-side TLS protocol version in the JDK, use the system property.
#Install microsoft jdbc driver for sql server how to#
How to change the protocol version on client side To use TLS 1.2 by default and disable older protocols, the following configurations need to be performed in the Java Runtime configuration: Most of the configurations related to SSL/TLS encryption protocols are found in the Java Runtime Environment and not directly related to the JDBC driver itself.Įach version of the JDBC driver supports different versions of the Runtime:īelow is a table with the JDK versions and TLS versions supported by Oracle Java implementation: Here you will find some information related to SSL/TLS handshake issues with the JDBC driver and how to enable TLS 1.2.
