Click here to monitor SSC
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Content with tag Certificates Rss

   Items 1 to 9 of 9   

Creating certificates

By pramod singla 2015/02/25 | Category: certificates
Rating: (not yet rated) |  Discuss |   Briefcase | 1,373 reads

Using Encrypted Backups in SQL Server 2014

This article details encrypted backups and how they are implemented in SQL Server 2014.  Read more...
By Perry Whittle 2014/05/15 | Source: | Category: encryption
Rating: |  Discuss |   Briefcase | 2,639 reads

Database Master Key Error After Database Restore

When restoring a database to another server, you may get a master key error if using symmetric keys   Read more...
Rating: |  Discuss |   Briefcase | 3,685 reads

Alter Certificate

By Steve Jones 2013/09/12 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,025 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: | Category: encryption
Rating: |  Discuss |   Briefcase | 1,610 reads

Backing up a Certificate

If you create your own certificate in SQL Server, you need to make sure that you back it up immediately....  Read more...
By 2012/03/07 | Source: | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 3,840 reads

Using Certificates to Sign Stored Procedures

How to sign stored procedures with certificates, this is useful if the procedures use dynamic SQL.  Read more...
By Jonathan Roberts 2010/06/21 | Source: | Category: certificates
Rating: |  Discuss |   Briefcase | 7,841 reads


By Steve Jones 2009/01/07 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,954 reads

Configuring Certificate-based Authentication in SQL Server Express' Distributed Service Broker Environment

Implementing a dialog between two services residing in a distributed environment requires the presence of an authentication mechanism. Windows-based Kerberos protocol limits the scope of systems participating in a Service Broker dialog to those residing in the same or trusted Active Directory domains. This article provides an overview of how to eliminate this limitation by employing certificates.  Read more...
By Additional Articles 2008/11/03 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 1,759 reads
   Items 1 to 9 of 9   
encryption (6)    
backup and restore (2)    
security (2)    
asymmetric keys (1)    
blogs (1)    
database master key (dmk) (1)    
dynamic sql (1)    
service broker (1)    
sql server express (1)    
stored procedures (1)    
symmetric key (1)    
symmetric keys (1)    
transparent data encryption (tde) (1)    
t-sql (1)