November 8, 2014 at 1:05 pm
Comments posted to this topic are about the item Backup Keys
November 9, 2014 at 2:00 pm
Here is another good reference on the topic
http://sqlity.net/en/2427/backup-asymmetric-key/
Jason...AKA CirqueDeSQLeil
_______________________________________________
I have given a name to my pain...MCM SQL Server, MVP
SQL RNNR
Posting Performance Based Questions - Gail Shaw[/url]
Learn Extended Events
November 10, 2014 at 12:58 am
Ohhhhh!!!
I didn't see the word "individual" 😉
Good question Steve
Have a good day
Rabih
rkaram
November 10, 2014 at 1:47 am
This was removed by the editor as SPAM
November 10, 2014 at 5:40 am
SQLRNNR (11/9/2014)
Here is another good reference on the topic
Thanx 4 that useful link 🙂
Thanks & Best Regards,
Hany Helmy
SQL Server Database Consultant
November 10, 2014 at 5:41 am
Stewart "Arturius" Campbell (11/10/2014)
Good question, thanks Steve.Only ever encrypted databases using certificates, so learned something here today.
Definitely.
Thanks & Best Regards,
Hany Helmy
SQL Server Database Consultant
November 10, 2014 at 6:27 am
Good question. Whenever I create keys, I back up the SQL I use to create them. This way I know how to recreate it exactly the way it was created in the first place. Of course, that brings up the point of what to do with the plain text to create the keys, but that's another discussion.
November 10, 2014 at 9:34 am
Ed Wagner (11/10/2014)
Good question. Whenever I create keys, I back up the SQL I use to create them. This way I know how to recreate it exactly the way it was created in the first place. Of course, that brings up the point of what to do with the plain text to create the keys, but that's another discussion.
Really this code becomes a password, and needs to be secured as such. It also complicates deployments, but that's another discussion.
November 10, 2014 at 11:50 am
Steve Jones - SSC Editor (11/10/2014)
Ed Wagner (11/10/2014)
Good question. Whenever I create keys, I back up the SQL I use to create them. This way I know how to recreate it exactly the way it was created in the first place. Of course, that brings up the point of what to do with the plain text to create the keys, but that's another discussion.Really this code becomes a password, and needs to be secured as such. It also complicates deployments, but that's another discussion.
Agreed. The SQL to create the key is something I treat just like a password, as it's the key to decrypting sensitive data.
November 11, 2014 at 6:38 am
SQLRNNR (11/9/2014)
Here is another good reference on the topic
That was a really good read. Thanks.
November 12, 2014 at 12:40 am
Nice question, thanks.
Need an answer? No, you need a question
My blog at https://sqlkover.com.
MCSE Business Intelligence - Microsoft Data Platform MVP
Viewing 11 posts - 1 through 10 (of 10 total)
You must be logged in to reply to this topic. Login to reply