To enforce TLS for SQL Server, we can configure the machine to use only TLS protocols. This ensures that TLS is used for authentication.
If we cannot enforce TLS at the machine level for some reason, we can also enforce encryption using connectionString on the ER Server machine.
To enforce encryption at ER Server, we can modify the connection string in the ReporterServer.exe.config file located in the C:\Program Files\Quest\Enterprise Reporter\Server folder. Add the connection string with Encrypt=True and TrustServerCertificate=False (if there is a verifiable server certificate).
Using Encrypt=True and TrustServerCertificate=True ensures encryption always occurs, but may use a self-signed server certificate. (Reference: https://learn.microsoft.com/en-us/dotnet/framework/data/adonet/connection-string-syntax).
To get the connection string, create a UDL file with the required information for SQL Server authentication. Verify that the connection tests successfully. Open the UDL file in Notepad and copy the connection string. Remove the provider from the connection string and paste it into the ReporterServer.exe.config file, with Encrypt=True and TrustServerCertificate=False (if there is a verifiable server certificate).
Initial config file database settings
After adding connection string (example):
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center