Solved

Advice on encrpting some store produces on MS SQL  sql

Posted on 2016-11-19
5
48 Views
Last Modified: 2016-12-01
Any advice if we crypt some store procedures in a db that already has uncryped SP.  Will there be any conflict? Please advice.
0
Comment
Question by:rayluvs
  • 2
  • 2
5 Comments
 
LVL 28

Expert Comment

by:Pawan Kumar
ID: 41894472
explain more what you want to achieve ?
0
 
LVL 69

Expert Comment

by:Qlemo
ID: 41894614
No. The in-built  encryption works per procedure, there is no conflict.
0
 

Author Comment

by:rayluvs
ID: 41894705
We have question working in what we want to achieve in EE: crypted queries.

It's just we thought that where the database already has over 100 store procedures which are not encrypted, we wanted to that our few SP saved as encrypted, would not affect the day-to-day use of the database.
0
 
LVL 69

Accepted Solution

by:
Qlemo earned 500 total points
ID: 41895162
Encrypted and non-encrypted procedures can exist side by side without any issues.
0
 

Author Comment

by:rayluvs
ID: 41895239
Thanx!
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Naughty Me. While I was changing the database name from DB1 to DB_PROD1 (yep it's not real database name ^v^), I changed the database name and notified my application fellows that I did it. They turn on the application, and everything is working. A …
Composite queries are used to retrieve the results from joining multiple queries after applying any filters. UNION, INTERSECT, MINUS, and UNION ALL are some of the operators used to get certain desired results.​
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question