Solved

SSRS configuration error

Posted on 2009-05-19
3
282 Views
Last Modified: 2012-05-07
I have attached a picture of what might be the cause of an SSRS Configuration error:

Restoring Encryption Key

Thanks for any help,


RSERROR.jpg
0
Comment
Question by:ksfok
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Expert Comment

by:Raja Jegan R
ID: 24422478
You need to backup the Encryption Key and then use it while Restoring.
More info on the steps involved below

http://msdn.microsoft.com/en-us/library/ms157275.aspx
0
 

Author Comment

by:ksfok
ID: 24422624
Can the same key be used for multiple times and across local system, network service, or local service? What could we do if the key was lost?
0
 
LVL 57

Accepted Solution

by:
Raja Jegan R earned 500 total points
ID: 24422719
You can backup a key for an instance once and you can use it for restoring in all machines where you try to use that report instance.

As it is mentioned earlier in the link above:

You only need to back up one copy of the symmetric key. There is a one-to-one correspondence between a report server database and a symmetric key. Although you only need to back up one copy, you might need to restore the key multiple times if you are running multiple report servers in a scale-out deployment model. Each report server instance will need its copy of the symmetric key to lock and unlock data in the report server database.

<< What could we do if the key was lost? >>
Store the key in a secure location and if you lose it you can backup the key again but if that changes, then you need to change in all machines where you have restored the old key.
Hence it is advisable to keep the key safe.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Long way back, we had to take help from third party tools in order to encrypt and decrypt data.  Gradually Microsoft understood the need for this feature and started to implement it by building functionality into SQL Server. Finally, with SQL 2008, …
In this article I will describe the Copy Database Wizard method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question