Creating and Registering SSL Certificates

A few days back, I was working with one of our partners who had a requirement of creating a SSL self-signed certificate through MMC console. As we are already aware that it is a complex and a tedious procedure, tried developing a script to ease the task for us. Also found that there were a…


SSL Encryption for SQL Server

Highlights of this video blog :- 1. What is SSL Encryption2. Why is it needed3. Configuring SSL Encryption for SQL Server4. Demo To watch the video in better quality, please check the link: –  Presented By: Azad Raosaheb Sale,SE,Microsoft GTSCReviewed By: Karthick Krishnamurthy,TL,Microsoft GTSC


Implementing SSL encryption for SQL Server in a DNS forwarding environment

Let’s say you have an environment which implements DNS forwarding. In such a setup, the client uses a different name (or FQDN) while connecting to SQL Server than the actual SQL Server name (or FQDN). The connection request is forwarded to actual SQL Server through DNS forwarding implemented at the n/w layer. In such an…


Setting up Database mirroring in SQL Server 2008 using T-SQL when the database is encrypted using Transparent Data Encryption.

Consider the following Scenario, You are using SQL Server 2008 Enterprise edition RTM or higher version and you are Transparent database encryption (new feature introduce in SQL Server 2008) to encrypt the Database to be mirrored. The database encryption key has been encrypted using a server certificate and which is turn encrypted using master database…


How to change the keys for the Encryption for an already encrypted database

Have you ever wondered how to change the keys for the encryption for an already encrypted database. For this you can use “Key Rotation”. Key rotation is the process of decrypting data with the old encryption key and encrypting the data with the new encryption key.   But how to use the Key Rotation with…


Regeneration of the Master Key fails when we try to take the backup of the Original Database and Restore on other instance of SQL server on other Machine

We have a production database in which the data is encrypted. The encryption follows the following hierarchy   1) The data is encrypted using Symmetric key 2) The symmetric key was encrypted using asymmetric key 3) The asymmetric key was encrypted using the master key of the database 4) The master key of the database…