Specifies that data should be encrypted before sending it over the network.
SNC SQL Native Client for Microsoft SQL Server
Encrypt=value
Encrypt=0
SQL Server 2005 always encrypts network packets associated with logging in to the server. If no certificate is provided on the server when it starts up, SQL Server generates a self-signed certificate that is used to encrypt login packets.
SQL Server Configuration Manager can be used to configure the SQL Native Client to request an encrypted connection using the Secure Sockets Layer (SSL), and to accept a self-signed certificate without validation. You can also request encryption by setting the Encrypt DBParm to 1, which sets the SQL Native Client connection string keyword Encrypt. To enable encryption to be used when a certificate has not been provided on the server, set both Encrypt and TrustServerCertificate. The value of TrustServerCertificate is ignored if Encrypt is not set.
To specify that PowerBuilder should encrypt data:
Database profile Select the Encrypt Data check box on the System page in the Database Profile Setup dialog box.
Application Type the following in code:
SQLCA.DBParm="Encrypt=1"