You can also then run a Wireshark packet trace filtered for the SQL Server DB IP address and port number defined in your connection string and verify that the network connection is indeed SSL encrypted.
Here are the explanation of each of parameters used in the URL.
jdbc:sqlserver://: This is the standard prefix for SQL Server JDBC connection URLs.
[host]: The hostname or IP address of your SQL Server instance.
[port]: The port number on which SQL Server is listening (default is 1433).
databaseName=[database]: The name of the database you want to connect to.
encryptionMethod=SSL: This property explicitly enables SSL encryption for the connection.
validateServerCertificate=[true/false]: This property determines whether the driver validates the server's SSL certificate.
Set to true for production environments to ensure the server's identity is verified. This requires a trust store containing the server's certificate.
Set to false for development or testing environments where certificate validation might be bypassed for convenience, but this is not recommended for production due to security risks.
Additional Information
In Addition to the above we need to perform the following steps on Clarity App servers.
Gather Root, Intermediate & server certificates for your SQL server.
Navigate to %JDK_HOME%/jre/lib/security where you can find a file named cacerts.
Import Root, Intermediate & server certificates to cacerts file. Following is an example.
Once the import is complete restart your NSA and Beacon and validate connectivity to your database. The previous connection strings that you defined on the NSA are still needed.
If there are multiple APP servers, please copy the cacerts file to other nodes under %JDK_HOME%/jre/lib/security.