June 24, 2018 at 4:03 am
Comments posted to this topic are about the item Enable FIPS 140-2 Compliance in SQL Server
June 25, 2018 at 1:32 am
"...When you enable FIPS and have an SSRS instance (or instances,) …"
haha, good one, from SSRS 2016 and higher you can't have more than 1 instance because Micrsoft decided to screw us over.
June 25, 2018 at 5:24 am
peter.row - Monday, June 25, 2018 1:32 AM"...When you enable FIPS and have an SSRS instance (or instances,) …"haha, good one, from SSRS 2016 and higher you can't have more than 1 instance because Micrsoft decided to screw us over.
I did not know this, thank you for the heads up. My work is currently on SQL2014, and my home lab I tend to keep at the same version for testing purposes. I'm rather surprised this was done, it's certainly going to make my next migration a bit more interesting (I've currently got one server with two instances of SSRS in production, and a QA server with four instances...)
June 25, 2018 at 6:03 am
jasona.work - Monday, June 25, 2018 5:24 AMpeter.row - Monday, June 25, 2018 1:32 AM"...When you enable FIPS and have an SSRS instance (or instances,) …"haha, good one, from SSRS 2016 and higher you can't have more than 1 instance because Micrsoft decided to screw us over.
I did not know this, thank you for the heads up. My work is currently on SQL2014, and my home lab I tend to keep at the same version for testing purposes. I'm rather surprised this was done, it's certainly going to make my next migration a bit more interesting (I've currently got one server with two instances of SSRS in production, and a QA server with four instances...)
They also changed the interfaces for custom security, so if you are using anything other than windows authentication you're going to have to change things there too. Basically HttpContext.Current always returns null in SSRS 2016 and higher, another case of grief caused by MS.
June 25, 2018 at 6:23 am
I saw you used 3DES in your SSRS config. All encryption algorithms, other than AES_128, AES_192, and AES_256, are deprecated for SQL 2016 and higher. I know you were just giving an example, but others may not be aware.
July 5, 2018 at 7:23 am
The article was very good and I have a question
In our environment we want to move away from using 3DES. Is there a way to call out a different algorithm in the two config files.
We are using SQL Server 2014 and SQL Reporting Server 2014 on Windows 2012 Server.
Your help is appreciated.
One possible solution was to move to SQL Reporting Server 2016, but management did not want to do this.
Your help is appreciated
Jeff
July 5, 2018 at 1:26 pm
john.deprato - Monday, June 25, 2018 6:23 AMI saw you used 3DES in your SSRS config. All encryption algorithms, other than AES_128, AES_192, and AES_256, are deprecated for SQL 2016 and higher. I know you were just giving an example, but others may not be aware.
jayoub - Thursday, July 5, 2018 7:23 AMThe article was very good and I have a questionIn our environment we want to move away from using 3DES. Is there a way to call out a different algorithm in the two config files.
We are using SQL Server 2014 and SQL Reporting Server 2014 on Windows 2012 Server.
Your help is appreciated.
One possible solution was to move to SQL Reporting Server 2016, but management did not want to do this.
Your help is appreciated
Thank you both for the comments.
As for the use of 3DES, I (to keep it simple) went with what the MS article had in the configuration file. I've not tried to make the change using a different algorithm, such as one of the AES- types.
Viewing 7 posts - 1 through 6 (of 6 total)
You must be logged in to reply to this topic. Login to reply