
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
@prisma/adapter-mssql
Advanced tools
This package contains the driver adapter for Prisma ORM that enables usage of the mssql database driver for Microsoft SQL Server.
The mssql driver is one of the most popular drivers in the JavaScript ecosystem for Microsoft SQL Server databases. It can be used with any SQL Server database that's accessed via TCP, including Azure SQL Database.
This section explains how you can use it with Prisma ORM and the @prisma/adapter-mssql driver adapter. Be sure that the DATABASE_URL environment variable is set to your SQL Server connection string (e.g. loaded using dotenv from a .env file).
Install the Prisma ORM's driver adapter:
npm install @prisma/adapter-mssql
Finally, when you instantiate Prisma Client, you need to pass an instance of Prisma ORM's driver adapter to the PrismaClient constructor:
import { PrismaMssql } from '@prisma/adapter-mssql'
import { PrismaClient } from '@prisma/client'
const config = {
server: 'localhost',
port: 1433,
database: 'mydb',
user: 'sa',
password: 'mypassword',
options: {
encrypt: true, // Use this if you're on Windows Azure
trustServerCertificate: true, // Use this if you're using self-signed certificates
},
}
const adapter = new PrismaMssql(config)
const prisma = new PrismaClient({ adapter })
You can also instantiate the adapter with a JDBC connection string:
import { PrismaMssql } from '@prisma/adapter-mssql'
import { PrismaClient } from '@prisma/client'
const adapter = new PrismaMssql('sqlserver://localhost:1433;database=testdb;user=sa;password=mypassword;encrypt=true')
const prisma = new PrismaClient({ adapter })
Entra ID authentication is supported by the mssql driver used by this adapter.
For options using the config object, see the options documentation for the Tedious driver.
For example, using the config object to configure DefaultAzureCredential:
import { PrismaMssql } from '@prisma/adapter-mssql'
import { PrismaClient } from '@prisma/client'
const config = {
server: 'localhost',
port: 1433,
database: 'mydb',
authentication: {
type: 'azure-active-directory-default',
},
options: {
encrypt: true,
},
}
const adapter = new PrismaMssql(config)
const prisma = new PrismaClient({ adapter })
Connection string parsing also supports authentication options, as per below:
authentication=DefaultAzureCredential in your connection stringauthentication=ActiveDirectoryPassworduserName=<value>password=<value>clientId=<value>authentication=ActiveDirectoryManagedIdentityclientId=<value> (optional)authentication=ActiveDirectoryServicePrincipaluserName=<client id>password=<client secret>FAQs
Prisma's driver adapter for "mssql"
The npm package @prisma/adapter-mssql receives a total of 7,003 weekly downloads. As such, @prisma/adapter-mssql popularity was classified as popular.
We found that @prisma/adapter-mssql demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.