Skip to content

Latest commit

 

History

History
37 lines (28 loc) · 2.46 KB

File metadata and controls

37 lines (28 loc) · 2.46 KB
title Service Master Key | Microsoft Docs
ms.custom
ms.date 06/13/2017
ms.prod sql-server-2014
ms.reviewer
ms.technology security
ms.topic conceptual
helpviewer_keywords
service master key [SQL Server]
service master key [SQL Server], about service master key
ms.assetid 85f2095d-2590-4f59-8a29-7e100edd02bb
author jaszymas
ms.author jaszymas
manager craigg

Service Master Key

The Service Master Key is the root of the [!INCLUDEssNoVersion] encryption hierarchy. It is generated automatically the first time it is needed to encrypt another key. By default, the Service Master Key is encrypted using the Windows data protection API and using the local machine key. The Service Master Key can only be opened by the Windows service account under which it was created or by a principal with access to both the service account name and its password.

Regenerating or restoring the Service Master Key involves decrypting and re-encrypting the complete encryption hierarchy. Unless the key has been compromised, this resource-intensive operation should be scheduled during a period of low demand.

[!INCLUDEssCurrent] uses the AES encryption algorithm to protect the service master key (SMK) and the database master key (DMK). AES is a newer encryption algorithm than 3DES used in earlier versions. After upgrading an instance of the [!INCLUDEssDE] to [!INCLUDEssCurrent] the SMK and DMK should be regenerated in order to upgrade the master keys to AES. For more information about regenerating the SMK, see ALTER SERVICE MASTER KEY (Transact-SQL) and ALTER MASTER KEY (Transact-SQL).

Best Practice

Back up the Service Master Key and store the backed up copy in a secure, off-site location.

Related Tasks

BACKUP SERVICE MASTER KEY (Transact-SQL)

RESTORE SERVICE MASTER KEY (Transact-SQL)

ALTER SERVICE MASTER KEY (Transact-SQL)

See Also

Encryption Hierarchy