Solved

How do you create the cert request file for SQL Server 2005?

Posted on 2008-10-16
4
327 Views
Last Modified: 2012-05-05
We have developed a client-server application written in visual basic and with SQL Server 2005 and want to enable SSL Encryption with a certificate. According to verisign, we need to create the cert request file from the SQL server. I did a web search and haven't come up with documentation on how to do that. Any help would be appreciated.
Thanks, Tarah
0
Comment
Question by:iharmony24
  • 2
  • 2
4 Comments
 
LVL 31

Expert Comment

by:Paranormastic
ID: 22733640
You can request one from another box if necessary, just put in the SQL server's machine name for the CN.  Then open Certificates MMC and export it from personal store, including private key, then import it on SQL box.
-or-
Open the Certificate MMC, point to local computer account not user
Right click on personal, All tasks, Request new certificate, follow the wizard and install the cert.
0
 

Author Comment

by:iharmony24
ID: 22734446
Just to make sure that I have this correctly:
I did nslookup from a remote computer with the ip address of the computer with the SQL Server installed on it.
I also did SELECT @@ServerName through SQL Server.

The two names were different. The one that I would use is the one I got from nslookup, right? Because the name I got from nslookup is the machine name, while the second is the SQL server name.

Just want to double check before I create the request.
Thanks for your help,
Tarah
0
 
LVL 31

Accepted Solution

by:
Paranormastic earned 500 total points
ID: 22734898
Yes, use the name of the server, not the SQL instance.  This would be the name of however you are accessing the server - either the hostname, FQDN, or IP address - usually you want the hostname for SQL.
0
 

Author Closing Comment

by:iharmony24
ID: 31506776
Thank you for your help. This was the answer.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question