Solved

SQL Encryption question

Posted on 2016-09-28
2
81 Views
Last Modified: 2016-09-29
Can anyone explain the difference between encryptbykey, encryption, encryptbypassphrase, and encryptbycert?

I basically want to know when is it ideal to use one method versus the other.
0
Comment
Question by:isames
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
arnold earned 500 total points
ID: 41820866
Just for the reference:

by Key
https://msdn.microsoft.com/en-us/library/ms174361.aspx

By passphrase
https://msdn.microsoft.com/en-us/library/ms190357.aspx
By cert
https://msdn.microsoft.com/en-us/library/ms188061.aspx

The key is info in the sql server.
The passphrase uses external INPUT.

You can also use cert based encryption.

You can encrypt the whole database. You can encrypt individual columns

Most deals with who controls access to the parameters as well as DR backup of references used for encryption......

I.e when the app uses passphrase, the app has to maintain the information use to encrypt to decrypt.

It might be a consideration for the setup/DR plans/backup plans..

Presumably if you are engaging in encrypting data with either, you should make sure your SQL connection forces encryption since all of these transmit the data in clear text.

You could encrypt data within the APP inserting encrypted data...
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows gives you an overview on SQL Server 2016 row level security. You will also get to know the usages of row-level-security and how it works
What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down …
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed
Viewers will learn how the fundamental information of how to create a table.

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question