Skip to content

Latest commit

 

History

History
46 lines (39 loc) · 3.94 KB

File metadata and controls

46 lines (39 loc) · 3.94 KB
title Configure Always Encrypted using SQL Server Management Studio | Microsoft Docs
ms.custom
ms.date 10/01/2019
ms.prod sql
ms.reviewer vanto
ms.technology security
ms.topic conceptual
f1_keywords
SQL13.SWB.COLUMNMASTERKEY.PAGE.F1
SQL13.SWB.COLUMNENCRYPTIONKEY.PAGE.F1
SQL13.SWB.COLUMNMASTERKEY.ROTATION.F1
helpviewer_keywords
Always Encrypted, configure with SSMS
ms.assetid 29816a41-f105-4414-8be1-070675d62e84
author VanMSFT
ms.author vanto
monikerRange =azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current

Configure Always Encrypted using SQL Server Management Studio

[!INCLUDEappliesto-ss-asdb-xxxx-xxx-md]

This article describes tasks for configuring Always Encrypted and managing databases that use Always Encrypted with SQL Server Management Studio (SSMS).

Security Considerations when using SSMS to Configure Always Encrypted

When you use SSMS to configure Always Encrypted, SSMS handles both Always Encrypted keys and sensitive data, so both the keys and the data appear in plaintext inside the SSMS process. Therefore, it's important you run SSMS on a secure computer. If your database is hosted in SQL Server, make sure SSMS runs on a different computer than the computer hosting your SQL Server instance. As the primary goal of Always Encrypted is to ensure encrypted sensitive data is safe even if the database system gets compromised, executing a PowerShell script that processes keys or sensitive data on the SQL Server computer can reduce or defeat the benefits of the feature. For additional recommendations, see Security Considerations for Key Management.

SSMS does not support role separation between those who manage the database (DBAs) and those who manage cryptographic secrets and have access to plaintext data (Security Administrators and/or Application Administrators). If your organization enforces role separation, you should use PowerShell to configure Always Encrypted. For more information, see Overview of Key Management for Always Encrypted and Configure Always Encrypted using PowerShell.

Always Encrypted Tasks using SSMS

See Also