docs/content/v2024.2/yugabyte-platform/security/enable-encryption-in-transit/_index.md
YugabyteDB Anywhere allows you to protect data in transit by using the following:
YugabyteDB Anywhere supports the following certificates for encryption in transit:
YugabyteDB Anywhere automatically alerts you 30 days before the expiry of any certificate. You can view the time to expiry of certificates by navigating to your universe Health tab.
You must rotate (refresh) TLS certificates before they expire to avoid service interruption.
{{<lead link="rotate-certificates/">}} For information on rotating certificates, refer to Rotate certificates. {{</lead>}}
You enable Node-to-Node and Client-to-Node encryption in transit when you create a universe.
You can also enable and disable encryption in transit for an existing universe as follows:
As TLS 1.0 and 1.1 are no longer accepted by PCI compliance, and considering significant vulnerabilities around these versions of the protocol, it is recommended that you migrate to TLS 1.2 or later versions.
You can set the TLS version for node-to-node and client-node communication. To enforce TLS 1.2, add the following flag for YB-TServer:
ssl_protocols = tls12
To enforce the minimum TLS version of 1.2, you need to specify all available subsequent versions for YB-TServer, as follows:
ssl_protocols = tls12,tls13
In addition, as the ssl_protocols setting does not propagate to PostgreSQL, it is recommended that you specify the minimum TLS version (ssl_min_protocol_version) for PostgreSQL by setting the following YB-TServer flag:
--ysql_pg_conf_csv="ssl_min_protocol_version='TLSv1.2'"
Add certificates to the YugabyteDB Anywhere Trust Store to validate connections from other services.
{{<lead link="trust-store/">}} See Trust store {{</lead>}}