Connect to SingleStore using TLS/SSL

Most client connections are TLS/SSL by default, even if no parameters are specified.

There are two options available that ensure a TLS/SSL connection :

  • Using the client side flag, such as --ssl-mode=REQUIRED in MySQL/Singlestore clients.

  • Using a user created with REQUIRE SSL (enforces on the server side).

The VERIFY_CA option is not required to use TLS/SSL. However, it can be used to prevent sophisticated man-in-the-middle attacks where a would-be attacker can impersonate a server when SSL is disabled or create a secure connection by impersonating a server using an illegitimate server certificate. If this is a concern, then use offline CA files in any SSL connection (not only Singlestore).

Refer to SSL Secure Connections for more information.

Refer to The SingleStore JDBC Driver for details on how to connect using JDBC.

Last modified: October 21, 2024

Was this article helpful?