To know how ConnectALL handles the Log4j 2 vulnerability issue, please read the article here.


How to enable SSL on a Database Connection

Before you start

Ensure that you have completed the below-listed steps:

  1. Enabling SSL usage of the user of muledb
  2. Importing of necessary cert to “$JAVA_HOME/jre/lib/security” via keytool
  3. Cross verifying the cert is added successfully via keytool with the right password

Enabling SSL

To enable the SSL:

Find the jdbc.url key in the db.properties file which will be in the following location: $MULE_HOME/conf/db.properties. You have to amend the connection parameters in the jdbc.url key. Provided below are the strings for various databases.

  • PostgreSQL

                      String url = "jdbc:postgresql://localhost/test?user=fred&password=secret&ssl=true";

  • MySQL

                     jdbc.url=jdbc:mysql://${host}:${port}/${database}?verifyServerCertificate=true&useSSL=true&requireSSL=true

  • Microsoft SQL Server

                     jdbc.url=jdbc:jtds:sqlserver://<servername>;DatabaseName=mssqldbname;useCursors=false;useNTLMv2=true;domain=<domain>;user=<username>;password=<password>;

  • Oracle

                    DB_URL = "jdbc:oracle:thin:@(DESCRIPTION= (ADDRESS=

                   (PROTOCOL=TCPS)(PORT=1522)(HOST=myhost))

                   (CONNECT_DATA=(SERVICE_NAME=myorcldbservicename))

                   (SECURITY=(ssl_server_cert_dn="CN=testcert.oracle.com, O=Oracle Corporation,L=Redwood City,ST=California,C=US")))"

  • Microsoft Azure SQL

                   jdbc.url=jdbc:sqlserver://<servername>;DatabaseName=mssqldbname;useCursors=false;useNTLMv2=true;domain=<domain>;user=<username>;password=<password>;