SQL Server 2019 RTM is shipped with TLS 1.2 support and no additional update/fix should be required to enable TLS 1.2 support. The server where SQL is installed must support TLS 1.2. Microsoft SQL 2019 /2016 is already enabled for TLS 1.2.
To ensure server can operate over TLS. Follow the below instructions to configure SQL server 2016.
- Enable TLS 1.2 to the registry if needed
- Start the registry editor by clicking on Start and Run. Type in “regedit” into the Run – Note: You will be editing the registry.
- Browse to the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols.
- Right click on the Protocols folder and select New then Key from the drop-down menu. This will create new folder. Rename this folder to TLS 1.2.
- Right click on the TLS 1.2 key and add two new keys underneath it.
- Rename the two new keys as:
- Client
- Server
- Right click on the Client key and select New and then DWORD (32-bit) Value from the drop-down list.
- Rename the DWORD to DisabledByDefault.
- Right-click the name DisabledByDefault and select Modify from the drop-down menu.
- Ensure that the Value data field is set to 0 and the Base is Hexadecimal. Click on OK.
- Create another DWORD for the Client key as you did in Step 6.
- Rename this second DWORD to Enabled.
- Right-click the name Enabled and select .. from the drop-down menu.
- Ensure that the Value data field is set to 1 and the Base is Hexadecimal. Click on OK.
- Repeat steps 6 to 13 for the Server key (by creating two DWORDs, DisabledByDefault and Enabled, and their values underneath the Server key).
- Registry values that are added or changed to enable TLS 1.2


- Configure .NET to use strong cryptography to the registry if needed. By configuring .NET to use strong cryptography this enables TLS 1.2 for .NET applications. Even if .NET 4.7 is installed it must be configured to enable TLS 1.2.
- Start the registry editor by clicking on Start and Run. Type in “regedit” into the Run – Note: You will be editing the registry.
- Browse to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
- Right click on the 0.30319 key and select New and then DWORD (32-bit) Value from the drop-down list.
- Rename the DWORD to SchUseStrongCrypto.
- Right-click the name SchUseStrongCrypto and select Modify from the drop-down menu.
- Ensure that the Value data field is set to 1 and the Base is Hexadecimal. Click on OK.
- Browse to the following registry key: HKLM:\SOFTWARE\Wow6432Node\Microsoft\.NetFramework\v4.0.30319
- Right click on the 4.0.30319 key and select New and then DWORD (32-bit) Value from the drop-down list.
- Rename the DWORD to SchUseStrongCrypto.
- Right-click the name SchUseStrongCrypto and select Modify from the drop-down menu.
- Ensure that the Value data field is set to 1 and the Base is Hexadecimal. Click on OK.
- Registry values that are added or changed to enable .NET to use strong crypto


Reboot the SQL Server: Once your SQL server has been rebooted, TLS 1.2 will be enabled.