JDBC V2 Connector > Introduction to JDBC V2 Connector > Connecting to SSL-enabled databases
  

Connecting to SSL-enabled databases

Before you can connect or run elastic mappings with SSL-enabled JDBC-complaint databases, you must download the SSL certificates to the Secure Agent machine, and then perform the prerequisite tasks.
    1. In the advanced session properties of the mapping task, select advanced.custom.property as the session property name.
    2. In the session property value, specify the following value:
    Spark.NeedUserCredentialFileForAdapter=true&:Spark.UserCredentialDirOnDIS=<Location of the SSL certificate on the Secure Agent machine>
    3. After you configure the properties in the mapping task, specify the JDBC URL in the JDBC V2 connection properties.
    To connect to an SSL-enabled Aurora PostgreSQL database, specify the following JDBC URL:
    jdbc:postgresql://<host>:<port>/dbname?sslmode=verify-ca&sslrootcert=<Location of the SSL certificate on the Secure Agent machine> , where the values for sslmode supports verify-ca and verify-ca.
    For example, jdbc:postgresql://aurorapostgres-appsdk.c5wj9sntucrg.ap-south-1.rds.amazonaws.com:5432/JDBC_V2?sslmode=verify-full&sslrootcert=/data/home/qamercury/cloud_td/Aurora_cert/rds-combined-ca-bundle.pem