Skip to content

Latest commit

 

History

History
41 lines (32 loc) · 2.6 KB

File metadata and controls

41 lines (32 loc) · 2.6 KB
title Service Master Key | Microsoft Docs
ms.custom
ms.date 03/14/2017
ms.prod sql-server-2016
ms.reviewer
ms.suite
ms.technology
database-engine
ms.tgt_pltfrm
ms.topic article
helpviewer_keywords
service master key [SQL Server]
service master key [SQL Server], about service master key
ms.assetid 85f2095d-2590-4f59-8a29-7e100edd02bb
caps.latest.revision 18
author BYHAM
ms.author rickbyh
manager jhubbard

Service Master Key

The Service Master Key is the root of the [!INCLUDEssNoVersion] encryption hierarchy. It is generated automatically the first time it is needed to encrypt another key. By default, the Service Master Key is encrypted using the Windows data protection API and using the local machine key. The Service Master Key can only be opened by the Windows service account under which it was created or by a principal with access to both the service account name and its password.

Regenerating or restoring the Service Master Key involves decrypting and re-encrypting the complete encryption hierarchy. Unless the key has been compromised, this resource-intensive operation should be scheduled during a period of low demand.

[!INCLUDEssCurrent] uses the AES encryption algorithm to protect the service master key (SMK) and the database master key (DMK). AES is a newer encryption algorithm than 3DES used in earlier versions. After upgrading an instance of the [!INCLUDEssDE] to [!INCLUDEssCurrent] the SMK and DMK should be regenerated in order to upgrade the master keys to AES. For more information about regenerating the SMK, see ALTER SERVICE MASTER KEY (Transact-SQL) and ALTER MASTER KEY (Transact-SQL).

Best Practice

Back up the Service Master Key and store the backed up copy in a secure, off-site location.

Related Tasks

BACKUP SERVICE MASTER KEY (Transact-SQL)

RESTORE SERVICE MASTER KEY (Transact-SQL)

ALTER SERVICE MASTER KEY (Transact-SQL)

See Also

Encryption Hierarchy