SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Certificates Rss

Search for any content tagged certificates

   Items 1 to 7 of 7   
 

Upgrade From SQL 2012 to SQL 2016 - Problem with Certificates

You may need to drop and recreate your certificates after migrating from SQL 2012 to SQL 2016+  Read more...
By Mike Good 2018/07/23 | Source: SQLServerCentral.com | Category: certificates
Rating: |  Discuss |   Briefcase | 631 reads

TDE with Automatic Database Seeding

Transparent Data Encryption on an Availability Group and Automatic Database Seeding  Read more...
By Evgeny Garaev 2018/03/08 | Source: SQLServerCentral.com | Category: availability group (ag)
Rating: |  Discuss |   Briefcase | 574 reads

Using Encrypted Backups in SQL Server 2014

This article details encrypted backups and how they are implemented in SQL Server 2014.  Read more...
By Perry Whittle 2014/05/15 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 2,853 reads

Database Master Key Error After Database Restore

When restoring a database to another server, you may get a master key error if using symmetric keys   Read more...
Rating: |  Discuss |   Briefcase | 4,333 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 1,619 reads

Using Certificates to Sign Stored Procedures

How to sign stored procedures with certificates, this is useful if the procedures use dynamic SQL.  Read more...
By Jonathan Roberts 2010/06/21 | Source: SQLServerCentral.com | Category: certificates
Rating: |  Discuss |   Briefcase | 7,997 reads

Configuring Certificate-based Authentication in SQL Server Express' Distributed Service Broker Environment

Implementing a dialog between two services residing in a distributed environment requires the presence of an authentication mechanism. Windows-based Kerberos protocol limits the scope of systems participating in a Service Broker dialog to those residing in the same or trusted Active Directory domains. This article provides an overview of how to eliminate this limitation by employing certificates.  Read more...
By Additional Articles 2008/11/03 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,112 reads
   Items 1 to 7 of 7