DataFlow encryption reference
| Database Type | Connector | Encryption on by default? | Notes | Supported JDBC options | 
|---|---|---|---|---|
| MySQL | JDBC | No | Can be configured through JDBC options | clientCertificateKeyStoreUrl=file:///root/work/mysql-ssl/keystore.jks& clientCertificateKeyStorePassword=password123& trustCertificateKeyStoreUrl=file:///root/work/mysql-ssl/ca-cert.jks&trustCertificateKeyStorePassword=password123 | 
| Oracle | JDBC | No | Can be configured through JDBC options | oracle.net.encryption_client=REQUESTED; oracle.net.crypto_checksum_client=REQUESTED; oracle.net.encryption_types_client=AES256; oracle.net.crypto_checksum_types_client=SHA1 | 
| MariaDB | JDBC | No | Can be configured through JDBC options | useSSL=true&password=password123& trustStore=/root/works/mariadb-ssl/certificates/mariaDB_TrustStore.jks&trustStorePassword=pass123& keyStore=/root/works/mariadb-ssl/certificates/mariaDB_keystore.jks& keyStorePassword=password123 | 
| PostgreSQL | JDBC | No | Can be configured through JDBC options | ssl=true&sslmode=ver ify-ca&sslpassword=password123&sslcert=/root/work/postgress-ssl/postgres_ssl_keys/postgresql.crt&sslkey=/root/work/postgress-ssl/postgres_ssl_keys/postgresql.der&sslrootcert=/root/work/postgress-ssl/postgres_ssl_keys/root.crt | 
| MSSQL | JDBC | No | Can be configured through JDBC options | trustServerCertificate=false;trustStore=/root/work/sqlserver-ssl/sqlserver_cert/sqlservernew_trust.jks;trustStorePassword=password123;encrypt=true | 
| Cassandra | JDBC | No | Can be configured through JDBC options | sslclientcert=/root/work/cassandra/keystore.jks;sslclientcertpassword=password123;sslclientcerttype=JKS;usessl=true | 
| MongoDB | JDBC | No | Can be configured through JDBC options | sslclientcert=/root/work/mongodb/keystore.jks;sslclientcertpassword=password123;sslclientcerttype=JKS;usessl=true | 
| Hive | JDBC | No | Available as an authentication type choice | |
| Presto | JDBC | No | Available as an authentication type choice | |
| SAP Adaptive Server Enterprise | JDBC | No | Can be configured through JDBC options | Encryption=ssl;TrustedFile='/path/to/the/trusted/roots/file'; | 
| Netezza | JDBC | No | Can be configured through JDBC options | securityLevel=onlySecured;CaCertFile=file:///root/work/netezza-ssl/nz_cert_key/ca-cert.pem | 
| IBM DB2 | JDBC | No | Can be configured through JDBC options | sslConnection=true;trustStore=/root/work/db2-ssl/db2_cert/db2_trust.jks;trustStorePassword=password123 | 
| Snowflake | JDBC | Yes | No configuration is required, by default Snowflake encrypts the data in transit. | |
| Amazon Redshift | JDBC | No | Configuration is same as for PostgreSQL. If the server’s certificate is CA signed and the CA is already in trusted list, then no need to explicitly set a truststore, just  | |
| Google BigQuery | Native Java Driver | Yes | https://cloud.google.com/security/encryption-in-transit#end_user_internet_to_a_google_cloud_service https://cloud.google.com/security/encryption-in-transit#encryption_in_transit_by_default | |
| Azure Synapse | JDBC | Yes | ||
| Teradata | JDBC | No | EncryptData property has to be set to true as suggested here: https://teradata-docs.s3.amazonaws.com/doc/connectivity/jdbc/reference/current/jdbcug_chapter_2.html#URL_ENCRYPTDATA | 
 | 
| SAP HANA | JDBC | No | Can be configured through JDBC options | encrypt=true;trustStore=/<path>/<to>/truststore.jks;trustStoreType=JKS;trustStorePassword=<password of the JKS file>;hostNameInCertificate=<FQDN in the server certificate> | 
| SAP SQL Anywhere | JDBC | No | Can be configured through JDBC options | ENCRYPTION=TLS(FIPS=OFF;TRUSTED_CERTIFICATE=rsaroot.crt;ALLOW_EXPIRED_CERTS=ON;SKIP_CERTIFICATE_NAME_CHECK=ON;CERTIFICATE_NAME=MyCertificateName) | 
| Amazon Aurora | JDBC | No | Can be configured through JDBC options | sslMode=VERIFY_IDENTITY&trustCertificateKeyStoreUrl=file:///root/work/mysql-ssl/ca-cert.jks&trustCertificateKeyStorePassword=password123 | 
| Denodo | JDBC | No | No parameters available for passing truststore explicitly, certificate is expected in the java default cacerts | 
 | 
| Databricks Delta Lake | JDBC/DBFS CLI | Yes | No configuration is required, the default connection string provided by Databricks is with SSL enabled with its port on 443. The DBFS CLI internally uses REST with https endpoints | |
| Vertica | JDBC | No | Option available in connection to enable SSL and provide trust details | |
| MemSQL | JDBC | Yes for Managed Instance | Option available in connection for on-premise MemSQL. Truststore details should be provided in connection | |
| Splunk | JDBC | No | No additional configuration required from connection as long as the SSL Server certificate is present in the default java truststore.
For example, use:  | |
| Salesforce | JDBC | No | No additional configuration required from connection as long as the SSL Server certificate is present in the default java truststore.
For example, use:  |