After installing the SSL certificate on SQL Server, we had to use the following attributes in database element of the CA PPM property file. We added useURL="true" and in the url attribute encryptionmethod=SSL.
You can also then run a wireshark packet trace filtered for the SQL Server DB IP address and port number defined in your connection string and verify that the network connection is indeed SSL encrypted.
In Addition to the above we need to perform the following steps on PPM App servers.
1. Gather Root, Intermediate & server certificates for your SQL server. 2. Navigate to %JDK_HOME%/jre/lib/security where you can find a file named cacerts. 3. Import Root, Intermediate & server certificates to cacerts file. Following is an example.
4. Once the import is complete restart your NSA and Beacon and validate connectivity to your database. The previous connection strings that you defined on the NSA are still needed. 5. If there are multiple APP servers, please copy the cacerts file to other nodes under %JDK_HOME%/jre/lib/security.