• RonKyle - Tuesday, May 23, 2017 8:17 AM

    That isn't a natural key. It is using a surrogate key from another system.

    We may have a difference of definition, but I consider the key generated by another system to be it's natural key.  

    I often get the feeling I'm the only person who still reads Dr. Codd's papers 🙁 His definition of a surrogate key is that it is unique, generated by the system and hidden from the users. Think about a system that uses hashing, but does not expose the hash.

    Please post DDL and follow ANSI/ISO standards when asking for help.