Thursday 20 February 2020

Now SSL connections imposed by Amazon Neptune

Amazon Neptune is a rapid, secure, quite organised graph database service that helps to create and execute applications which operate with highly associated datasets, so further you don’t have to bother about database management activities like hardware provisioning, software patching, setup, configuration, or backups. The basics of Amazon Neptune is a purpose-built, high-performance graph database engine optimised for saving billions of relationships and querying the graph with milliseconds latency. Mostly Amazon Neptune permits only Secure Sockets Layer (SSL) connections via HTTPS to an instance or cluster endpoint. Now Amazon Neptune imposes SSL connections to your database. You have an alternative to deactivate SSL in regions, like US East (N. Virginia) or Europe (London), where both SSL and non-SSL connections are supported. You can deactivate SSL by altering the database cluster parameter from the AWS Management Console, or through the modify-db-cluster-parameter-group command via the AWS CLI. Amazon Neptune has always supported SSL connections to databases in every region, but did not cover the potential to impose SSL connections. Customers asked us for an easy way to allow only SSL connections to their database. When new cluster is created, the newly created neptune_enforce_ssl parameter is activated. Databases that have this parameter activated will merely undertake SSL connections. To know more about this new feature, visit the Neptune User Guide.

No comments:

Post a Comment

Maximizing Content Delivery Efficiency: Optimizing Performance in AWS CloudFront

  Unleash Blazing-Fast Content Delivery: Your Guide to CloudFront Optimization Introduction: AWS CloudFront stands as a cornerstone of moder...