@ -420,7 +420,9 @@ PGconn *PQconnectdbParams(const char **keywords, const char **values, int expand
<term><literal>require</literal></term>
<term><literal>require</literal></term>
<listitem>
<listitem>
<para>
<para>
only try an <acronym>SSL</> connection
only try an <acronym>SSL</> connection. If a root CA
file is present, verify the certificate in the same way as
if <literal>verify-ca</literal> was specified
</para>
</para>
</listitem>
</listitem>
</varlistentry>
</varlistentry>
@ -6732,6 +6734,18 @@ ldap://ldap.acme.com/cn=dbserver,cn=hosts?pgconnectinfo?base?(objectclass=*)
the connection parameters <literal>sslrootcert</> and <literal>sslcrl</>
the connection parameters <literal>sslrootcert</> and <literal>sslcrl</>
or the environment variables <envar>PGSSLROOTCERT</> and <envar>PGSSLCRL</>.
or the environment variables <envar>PGSSLROOTCERT</> and <envar>PGSSLCRL</>.
</para>
</para>
<note>
<para>
For backwards compatibility with earlier versions of PostgreSQL, if a
root CA file exists, the behavior of
<literal>sslmode</literal>=<literal>require</literal> will be the same
as that of <literal>verify-ca</literal>, meaning the sever certificate
is validated against the CA. Relying on this behavior is discouraged,
and applications that need certificate validation should always use
<literal>validate-ca</literal> or <literal>validate-full</literal>.
</para>
</note>
</sect2>
</sect2>
<sect2 id="libpq-ssl-clientcert">
<sect2 id="libpq-ssl-clientcert">