OpenEdge SQL client-server compatibility matrix with FIPS mode
- Last Updated: February 11, 2026
- 1 minute read
- OpenEdge
- Version 13.0
- Documentation
The following compatibility matrix details the forward and backward compatibility between
OpenEdge SQL clients and OpenEdge SQL servers. It is important to note that clients
running OpenEdge Release 13.0 and earlier can communicate with newer OpenEdge SQL
servers running Release 13.0.
| Client version | Client FIPS status | Server version | Server FIPS status | Behavior |
|---|---|---|---|---|
| Pre-13.0 | NA | 13.0 and later | Enabled |
|
| 13.0 and later | Enabled | Pre-13.0 | NA |
|
| 13.0 and later | Disabled | 13.0 and later | Enabled |
|
| 13.0 and later | Enabled | 13.0 and later | Disabled |
|
Notes
-
For more information, see FIPS mode.
- Starting from OpenEdge Release 13.0, the
aedh0prefix is the default for password encoding in SQL utilities, and it is FIPS-compliant. - Database administrators can use the
ALTER USERSQL statement, which regenerates the password using Password-Based Key Derivation Function 2 (PBKDF2) for compliance when FIPS mode is disabled. - When FIPS mode is enabled on the OpenEdge SQL server, only FIPS-approved cipher suites are allowed for TLS connections, which means older clients may fail the handshake if they do not support these ciphers. For more information, see TLS and FIPS Mode for OpenEdge SQL JDBC and ODBC clients.
- Disabling FIPS on the client does not change the password encoding behavior because in
OpenEdge Release 13, SQL utilities continue to use the
aedh0prefix by default. - DataDirect ODBC and JDBC drivers for the OpenEdge database have been enhanced
to support longer encoded passwords required for FIPS-compliant encoding
generated by the
genpasswordutility.For more information on encoding prefixes supported by
genpasspword, see genpassword.