Click here to monitor SSC
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Content with tag Certificates Rss

   Items 1 to 9 of 9   

Creating certificates

By pramod singla 2015/02/25 | Category: certificates
Rating: (not yet rated) |  Discuss |   Briefcase | 1,363 reads

Using Encrypted Backups in SQL Server 2014

This article details encrypted backups and how they are implemented in SQL Server 2014.  Read more...
By Perry Whittle 2014/05/15 | Source: | Category: encryption
Rating: |  Discuss |   Briefcase | 2,613 reads

Database Master Key Error After Database Restore

When restoring a database to another server, you may get a master key error if using symmetric keys   Read more...
Rating: |  Discuss |   Briefcase | 3,654 reads

Alter Certificate

By Steve Jones 2013/09/12 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,023 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: | Category: encryption
Rating: |  Discuss |   Briefcase | 1,609 reads

Backing up a Certificate

If you create your own certificate in SQL Server, you need to make sure that you back it up immediately....  Read more...
By 2012/03/07 | Source: | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 3,429 reads

Using Certificates to Sign Stored Procedures

How to sign stored procedures with certificates, this is useful if the procedures use dynamic SQL.  Read more...
By Jonathan Roberts 2010/06/21 | Source: | Category: certificates
Rating: |  Discuss |   Briefcase | 7,835 reads


By Steve Jones 2009/01/07 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,947 reads

Configuring Certificate-based Authentication in SQL Server Express' Distributed Service Broker Environment

Implementing a dialog between two services residing in a distributed environment requires the presence of an authentication mechanism. Windows-based Kerberos protocol limits the scope of systems participating in a Service Broker dialog to those residing in the same or trusted Active Directory domains. This article provides an overview of how to eliminate this limitation by employing certificates.  Read more...
By Additional Articles 2008/11/03 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 1,727 reads
   Items 1 to 9 of 9   
encryption (6)    
backup and restore (2)    
security (2)    
asymmetric keys (1)    
blogs (1)    
database master key (dmk) (1)    
dynamic sql (1)    
service broker (1)    
sql server express (1)    
stored procedures (1)    
symmetric key (1)    
symmetric keys (1)    
transparent data encryption (tde) (1)    
t-sql (1)