Reference documentation and code samples for the Google Cloud Sql Admin V1beta4 Client class SslMode.
The SSL options for database connections.
Protobuf type google.cloud.sql.v1beta4.IpConfiguration.SslMode
Namespace
Google \ Cloud \ Sql \ V1beta4 \ IpConfigurationMethods
static::name
Parameter | |
---|---|
Name | Description |
value |
mixed
|
static::value
Parameter | |
---|---|
Name | Description |
name |
mixed
|
Constants
SSL_MODE_UNSPECIFIED
Value: 0
The SSL mode is unknown.
Generated from protobuf enum SSL_MODE_UNSPECIFIED = 0;
ALLOW_UNENCRYPTED_AND_ENCRYPTED
Value: 1
Allow non-SSL/non-TLS and SSL/TLS connections.
For SSL connections to MySQL and PostgreSQL, the client certificate
isn't verified.
When this value is used, the legacy require_ssl
flag must be false or
cleared to avoid a conflict between the values of the two flags.
Generated from protobuf enum ALLOW_UNENCRYPTED_AND_ENCRYPTED = 1;
ENCRYPTED_ONLY
Value: 2
Only allow connections encrypted with SSL/TLS.
For SSL connections to MySQL and PostgreSQL, the client certificate
isn't verified.
When this value is used, the legacy require_ssl
flag must be false or
cleared to avoid a conflict between the values of the two flags.
Generated from protobuf enum ENCRYPTED_ONLY = 2;
TRUSTED_CLIENT_CERTIFICATE_REQUIRED
Value: 3
Only allow connections encrypted with SSL/TLS and with valid client certificates.
When this value is used, the legacy require_ssl
flag must be true or
cleared to avoid the conflict between values of two flags.
PostgreSQL clients or users that connect using IAM database
authentication must use either the
Cloud SQL Auth
Proxy or
Cloud SQL
Connectors
to enforce client identity verification.
Only applicable to MySQL and PostgreSQL. Not applicable to SQL Server.
Generated from protobuf enum TRUSTED_CLIENT_CERTIFICATE_REQUIRED = 3;