Database
Microsoft SQL Server

Enable Transparent Data encryption on the Microsoft SQL Server

1min

All of the following commands need to be run inside a Query window in SQL Server Management Studio.

1

Create a credential for use by system administrators.

Text


The values set in the IDENTITY and SECRET fields should be the name and password of the identity created on the that is specified in the FXCL EKM configuration file (i.e., config.json).

2

Add the credential to a highly privileged user, such as your own domain login.

Text

3

Create an asymmetric key stored in through the EKM provider.

Text

4

Create a credential for the Database Engine to use.

Text


The values set in the IDENTITY and SECRET fields should be the name and password of the identity created on the CryptoHub that is specified in the FXCL EKM configuration file (such as config.json).

5

Create a login that uses the asymmetric key stored inside the FXCL EKM provider.

Text

6

Enable the login to use the database engine credentials.

Text

7

Create a new example database, add a table to it, then insert information into the table.

Database encryption operations cannot be executed on master, model, tempdb, msdb, or resource databases.

Text

8

Create a database encryption key for the exampleDB database.

Text

9

Enable transparent data encryption on the exampleDB database.

Text

10

Check if data can be decrypted.

If possible, restart SQL Server service with the CryptoHub offline, then check if the following command fails. If it does, then TDE is set up correctly. If the CryptoHub is online, the command should succeed.

Text