Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do you create the cert request file for SQL Server 2005?

Posted on 2008-10-16
4
Medium Priority
?
345 Views
Last Modified: 2012-05-05
We have developed a client-server application written in visual basic and with SQL Server 2005 and want to enable SSL Encryption with a certificate. According to verisign, we need to create the cert request file from the SQL server. I did a web search and haven't come up with documentation on how to do that. Any help would be appreciated.
Thanks, Tarah
0
Comment
Question by:iharmony24
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 31

Expert Comment

by:Paranormastic
ID: 22733640
You can request one from another box if necessary, just put in the SQL server's machine name for the CN.  Then open Certificates MMC and export it from personal store, including private key, then import it on SQL box.
-or-
Open the Certificate MMC, point to local computer account not user
Right click on personal, All tasks, Request new certificate, follow the wizard and install the cert.
0
 

Author Comment

by:iharmony24
ID: 22734446
Just to make sure that I have this correctly:
I did nslookup from a remote computer with the ip address of the computer with the SQL Server installed on it.
I also did SELECT @@ServerName through SQL Server.

The two names were different. The one that I would use is the one I got from nslookup, right? Because the name I got from nslookup is the machine name, while the second is the SQL server name.

Just want to double check before I create the request.
Thanks for your help,
Tarah
0
 
LVL 31

Accepted Solution

by:
Paranormastic earned 2000 total points
ID: 22734898
Yes, use the name of the server, not the SQL instance.  This would be the name of however you are accessing the server - either the hostname, FQDN, or IP address - usually you want the hostname for SQL.
0
 

Author Closing Comment

by:iharmony24
ID: 31506776
Thank you for your help. This was the answer.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question