Google Cloud Sql Admin V1 Client - Class SslMode (0.19.0)

Reference documentation and code samples for the Google Cloud Sql Admin V1 Client class SslMode.

The SSL options for database connections.

Protobuf type google.cloud.sql.v1.IpConfiguration.SslMode

Namespace

Google \ Cloud \ Sql \ V1 \ IpConfiguration

Methods

static::name

Parameter
Name Description
value mixed

static::value

Parameter
Name Description
name mixed

Constants

SSL_MODE_UNSPECIFIED

Value: 0

The SSL mode is unknown.

Generated from protobuf enum SSL_MODE_UNSPECIFIED = 0;

ALLOW_UNENCRYPTED_AND_ENCRYPTED

Value: 1

Allow non-SSL/non-TLS and SSL/TLS connections.

For SSL connections to MySQL and PostgreSQL, the client certificate isn't verified. When this value is used, the legacy require_ssl flag must be false or cleared to avoid a conflict between the values of the two flags.

Generated from protobuf enum ALLOW_UNENCRYPTED_AND_ENCRYPTED = 1;

ENCRYPTED_ONLY

Value: 2

Only allow connections encrypted with SSL/TLS.

For SSL connections to MySQL and PostgreSQL, the client certificate isn't verified. When this value is used, the legacy require_ssl flag must be false or cleared to avoid a conflict between the values of the two flags.

Generated from protobuf enum ENCRYPTED_ONLY = 2;

TRUSTED_CLIENT_CERTIFICATE_REQUIRED

Value: 3

Only allow connections encrypted with SSL/TLS and with valid client certificates.

When this value is used, the legacy require_ssl flag must be true or cleared to avoid the conflict between values of two flags. PostgreSQL clients or users that connect using IAM database authentication must use either the Cloud SQL Auth Proxy or Cloud SQL Connectors to enforce client identity verification. Only applicable to MySQL and PostgreSQL. Not applicable to SQL Server.

Generated from protobuf enum TRUSTED_CLIENT_CERTIFICATE_REQUIRED = 3;