SQL Relay supports a tlscert parameter in the SQL Relay server's configuration file, and as an argument to the various command line client programs. In either case, it specifies the TLS certificate chain to use.
Instead of requiring a certificate chain, some applications allow you to just configure them with a public and private key. This enables the application to perform TLS encryption, but not auth. SQL Relay doesn't (currently) allow this. You have to provide a certificate chain, even if you only want to use TLS encryption and not auth.
On non-Windows platforms, you must specify a certificate chain file. For example:
/usr/local/firstworks/etc/sqlrserver.pem or /usr/local/firstworks/etc/sqlrclient.pem
On Windows platforms you may specify a certificate chain file. For example:
C:\\Program Files\\Firstworks\\etc\\sqlrserver.pfx or C:\\Program Files\\Firstworks\\etc\\sqlrclient.pfx
(note the double-backslashes)
Or, you may specify a certificate in a Windows Certificate Store. For example:
CURRENT_USER:MY:sqlrserver or MY:sqlrserver or sqlrserver or CURRENT_USER:MY:sqlrclient or MY:sqlrclient or sqlrclient
For actual files:
For certificates in a Windows Certificate store: