TLS/SSL server authentication
- Last Updated: March 14, 2026
- 4 minute read
- DataDirect Connectors
- ODBC
- Amazon Redshift 8.0
- Documentation
When the client makes a connection request, the server presents its public certificate for the client to accept or deny. The client checks the issuer of the certificate against a list of trusted Certificate Authorities (CAs) that resides in an encrypted file on the client known as a truststore. If the certificate matches a trusted CA in the truststore, an encrypted connection is established between the client and server. If the certificate does not match, the connection fails and the driver generates an error.
Most truststores are password-protected. The driver must be able to locate the truststore and unlock the truststore with the appropriate password. Two connection options are available to the driver to provide this information: Trust Store (Truststore) and Trust Store Password (TruststorePassword). The value of Trust Store is a pathname that specifies the location of the truststore file. The value of Trust Store Password is the password required to access the contents of the truststore.
Alternatively, you can configure the driver to trust any certificate sent by the server, even if the issuer is not a trusted CA. Allowing a driver to trust any certificate sent from the server is useful in test environments because it eliminates the need to specify truststore information on each client in the test environment. Setting the Validate Server Certificate (ValidateServerCertificate) connection option to false allows the driver to accept any certificate returned from the server regardless of whether the issuer of the certificate is a trusted CA.
Finally, the connection option, Host Name In Certificate (HostNameInCertificate), allows an additional method of server verification. When a value is specified for Host Name In Certificate, it must match the common name of the host in the Subject of the certificate. This prevents malicious intervention between the client and the server and ensures that the driver is connecting to the server that was requested.
- Set the Host Name (HostName) option to specify the name or the IP address of the server to which you want to connect.
- Set the Port Number (PortNumber) option to specify the port number of
the server listener. The default is
5439. - Set the Database Name (Database) option to specify the name of the database to which you want to connect.
- Set the Encryption Method (EncryptionMethod) option to
1. - Set the Validate Server Certificate (ValidateServerCertificate) option to determine
whether the driver validates the certificates sent by the server. When it is set to
1, the driver validates the certificates. When it is set to0, the driver does not validate the certificates. - Set the Host Name In Certificate (HostNameInCertificate) option to specify the host name that is specified in the Subject of the certificate. This option provides additional security against man-in-the-middle (MITM) attacks by ensuring that the server the driver is connecting to is the server that was requested. Consult your SSL administrator for the correct value.
- Set the Trust Store (Truststore) option to specify either the full path of the truststore file or the contents of the TLS/SSL certificates.
- Set the Truststore Password (TruststorePassword) option to specify the password that is used to access the truststore file.
- Optionally, set the Enable FIPS (EnableFIPS) connection option to
1to allow the driver to load the FIPS provider. The FIPS provider contains a set of approved cryptographic algorithms that conform to the Federal Information Processing Standards (FIPS) specified in FIPS 140-2. If you do not specify a value for Enable FIPS, the driver uses its default value (0) and loads the default provider.Note:- The FIPS provider is supported only on the following platforms: Windows 64-bit, Linux 64-bit, and AIX 64-bit.
- Do not set the Truststore Password connection option when using the FIPS provider. The truststore password uses the PKCS12KDF algorithm, which is not an approved FIPS algorithm. Hence, it must not be specified when using the FIPS provider.
- For using the FIPS and default providers, the certificates must be generated using the OpenSSL 3.5-compliant cryptographic algorithms. See "Generating TLS/SSL certificates using OpenSSL 3.5-compliant algorithms" for more information.
The following examples show how to configure the driver to establish a
connection via user ID/password authentication and use data encryption via TLS/SSL server
authentication. In these examples, since ValidateServerCertificate=1 and EnableFIPS=1, the driver
validates the certificate sent by the server and the host name specified by the
HostNameInCertificate option, and loads the FIPS provider for data encryption.
Connection string
Truststore:
DRIVER=DataDirect 8.0 Amazon Redshift Wire Protocol;EnableFIPS=1;EncryptionMethod=1;
HostName=YourServer;HostNameInCertificate=MySubjectAltName;PortNumber=5439;
Database=db1;Truststore=TrustStoreName;ValidateServerCertificate=1
Windows certificate store:
DRIVER=DataDirect 8.0 Amazon Redshift Wire Protocol;EnableFIPS=1;EncryptionMethod=1;
HostName=YourServer;HostNameInCertificate=MySubjectAltName;PortNumber=5439;
Database=db1;ValidateServerCertificate=1
odbc.ini
Truststore:
Driver=ODBCHOME/lib/ivrsftxx.so
Description=DataDirect Amazon Redshift Wire Protocol
...
EnableFIPS=1
...
EncryptionMethod=1
...
HostName=YourServer
...
HostNameInCertificate=MySubjectAltName
...
PortNumber=5439
...
Database=db1
...
Truststore=TrustStoreName
...
ValidateServerCertificate=1
...
Windows certificate store:
Driver=ODBCHOME/lib/ivrsftxx.so
Description=DataDirect Amazon Redshift Wire Protocol
...
EnableFIPS=1
...
EncryptionMethod=1
...
HostName=YourServer
...
HostNameInCertificate=MySubjectAltName
...
PortNumber=5439
...
Database=db1
...
ValidateServerCertificate=1
...