> Isn't that also exactly as insecure as submitting an HTML form with <input type="password"> is?
Absolutely, but I am arguing that this is not worthy of an enterprise system like SQL Server. This is especially true for a back-end system, because at least in a web browser, you'd get a warning if the certificate cannot be verified (and the connection is therefore vulnerable).
> Which ones are you thinking of?
Most of the enterprise apps I have worked with use something like OAuth or SAML. For sure, many have an option to use basic auth, but that's only used for testing and development, and would be a red flag in any security audit.
I'll just quote Microsoft's documentation <https://docs.microsoft.com/en-us/sql/relational-databases/se...>:
Disadvantages of SQL Server Authentication
The encrypted SQL Server Authentication login password, must be passed over the network at the time of the connection.
It's good that they acknowledge it, but it would be a lot better if they did something about it.