Skip to content

Commit 8144711

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/sql-docs-pr into tsqlxml
2 parents 918cdd8 + dc12827 commit 8144711

9 files changed

Lines changed: 61 additions & 30 deletions

docs/connect/ado-net/sql/sql-server-features-adonet.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "SQL Server features and ADO.NET"
33
description: "Describes SQL Server features that are useful for ADO.NET application developers."
4-
ms.date: "08/15/2019"
4+
ms.date: "07/09/2020"
55
ms.assetid: 2839529b-a79b-4450-be5d-07a98dbc7a0f
66
ms.prod: sql
77
ms.prod_service: connectivity
@@ -50,6 +50,9 @@ Describes SqlClient support for LocalDB databases.
5050
[SqlClient support for Always Encrypted](sqlclient-support-always-encrypted.md)
5151
Describes SqlClient support for the Always Encrypted feature.
5252

53+
[SqlClient support for Data Discovery and Classification](data-classification.md)
54+
Describes how to access Data Discovery and Classification information through SqlClient.
55+
5356
## Next steps
5457
- [SQL Server data operations in ADO.NET](sql-server-data-operations.md)
5558
- [SQL Server and ADO.NET](index.md)

docs/connect/jdbc/code-samples/retrieving-result-set-data-sample.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "Retrieving result set data sample | Microsoft Docs"
2+
title: "Retrieving result set data sample"
3+
description: "Learn how to retrieve a set of data from a SQL database and display that information in a Java application."
34
ms.custom: ""
45
ms.date: "08/12/2019"
56
ms.prod: sql

docs/connect/jdbc/diagnosing-problems-with-the-jdbc-driver.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "Diagnosing problems with the JDBC driver | Microsoft Docs"
2+
title: "Diagnosing problems with the JDBC driver"
3+
description: "Learn how to diagnose and troubleshoot problems like error handling, checking the driver version and tracing."
34
ms.custom: ""
45
ms.date: "08/12/2019"
56
ms.prod: sql

docs/connect/jdbc/getting-the-driver-version.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "Getting the driver version | Microsoft Docs"
2+
title: "Getting the driver version"
3+
description: "Learn how and where to find the version of the Microsoft JDBC Driver for SQL Server."
34
ms.custom: ""
45
ms.date: "08/12/2019"
56
ms.prod: sql

docs/connect/jdbc/retrieving-result-set-data-sample.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "Retrieving result set data sample | Microsoft Docs"
2+
title: "Retrieving result set data sample"
3+
description: "Learn how to retrieve a set of data from a SQL database and display that information in a Java application."
34
ms.custom: ""
45
ms.date: "08/12/2019"
56
ms.prod: sql

docs/connect/php/how-to-send-and-retrieve-utf-8-data-using-built-in-utf-8-support.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "How to: Send and Retrieve UTF-8 Data Using Built-In UTF-8 Support | Microsoft Docs"
2+
title: "How to: Send and Retrieve UTF-8 Data Using Built-In UTF-8 Support"
3+
description: "Learn how to send and retrieve UTF-8 encoded data using UTF-8 support built in to the drivers for PHP."
34
ms.custom: ""
45
ms.date: "03/23/2018"
56
ms.prod: sql

docs/connect/php/sqlsrv-driver-api-reference.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: "SQLSRV Driver API Reference | Microsoft Docs"
2+
title: "SQLSRV Driver API Reference"
3+
description: "The API reference for the SQLSRV driver for PHP describes available functions, their parameters, and return values."
34
ms.custom: ""
45
ms.date: "03/26/2018"
56
ms.prod: sql

docs/relational-databases/security/encryption/transparent-data-encryption.md

Lines changed: 44 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The following illustration shows the architecture of TDE encryption. Only the da
7777

7878
![The Transparent Database Encryption architecture](../../../relational-databases/security/encryption/media/tde-architecture.png)
7979

80-
## Using Transparent Data Encryption
80+
## Enable TDE
8181

8282
To use TDE, follow these steps.
8383

@@ -166,7 +166,7 @@ If you use a database in database mirroring or log shipping, both databases are
166166
> [!TIP]
167167
> To monitor changes in the TDE status of a database, use SQL Server Audit or SQL Database auditing. For SQL Server, TDE is tracked under the audit action group DATABASE_CHANGE_GROUP, which you can find in [SQL Server Audit Action Groups and Actions](../../../relational-databases/security/auditing/sql-server-audit-action-groups-and-actions.md).
168168
169-
### Restrictions
169+
## Restrictions
170170

171171
The following operations are disallowed during initial database encryption, key change, or database decryption:
172172

@@ -218,7 +218,29 @@ When database files are created, instant file initialization is unavailable when
218218

219219
To encrypt a database encryption key with an asymmetric key, the asymmetric key must be on an extensible key-management provider.
220220

221-
### Transparent Data Encryption and transaction logs
221+
## TDE scan
222+
223+
To enable TDE on a database, [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] must do an encryption scan. The scan reads each page from the data files into the buffer pool and then writes the encrypted pages back out to disk.
224+
225+
To give you more control over the encryption scan, [!INCLUDE[sql-server-2019](../../../includes/sssqlv15-md.md)] introduces TDE scan, which has a suspend and resume syntax. You can pause the scan while the workload on the system is heavy or during business-critical hours and then resume the scan later.
226+
227+
Use the following syntax to pause the TDE encryption scan:
228+
229+
```sql
230+
ALTER DATABASE <db_name> SET ENCRYPTION SUSPEND;
231+
```
232+
233+
Similarly, use the following syntax to resume the TDE encryption scan:
234+
235+
```sql
236+
ALTER DATABASE <db_name> SET ENCRYPTION RESUME;
237+
```
238+
239+
The encryption_scan_state column has been added to the sys.dm_database_encryption_keys dynamic management view. It shows the current state of the encryption scan. There's also a new column called encryption_scan_modify_date, which contains the date and time of the last encryption-scan state change.
240+
241+
If the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance restarts while its encryption scan is suspended, a message is logged in the error log on startup. The message indicates that an existing scan has been paused.
242+
243+
## TDE and transaction logs
222244

223245
Letting a database use TDE removes the remaining part of the current virtual transaction log. The removal forces creation of the next transaction log. This behavior guarantees that no clear text is left in the logs after the database is set for encryption.
224246

@@ -241,51 +263,51 @@ Before a database encryption key changes, the previous database encryption key e
241263

242264
If you change a database encryption key twice, you must do a log backup before you can change the database encryption key again.
243265

244-
### Transparent Data Encryption and the tempdb system database
266+
## TDE and the tempdb system database
245267

246268
The **tempdb** system database is encrypted if any other database on the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance is encrypted by using TDE. This encryption might have a performance effect for unencrypted databases on the same [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance. For more information about the **tempdb** system database, see [tempdb Database](../../../relational-databases/databases/tempdb-database.md).
247269

248-
### Transparent Data Encryption and replication
270+
## TDE and replication
249271

250272
Replication doesn't automatically replicate data from a TDE-enabled database in an encrypted form. Separately enable TDE if you want to protect distribution and subscriber databases.
251273

252274
Snapshot replication can store data in unencrypted intermediate files like BCP files. The initial data distribution for transactional and merge replication can too. During such replication, you can enable encryption to protect the communication channel.
253275

254276
For more information, see [Enable Encrypted Connections to the Database Engine (SQL Server Configuration Manager)](../../../database-engine/configure-windows/enable-encrypted-connections-to-the-database-engine.md).
255277

256-
### Transparent Data Encryption and FILESTREAM data
278+
## TDE and Always On
279+
You can [add an encrypted database to an Always On availability group](../../../database-engine/availability-groups/windows/encrypted-databases-with-always-on-availability-groups-sql-server.md).
257280

258-
**FILESTREAM** data isn't encrypted even when you enable TDE.
281+
To encrypt databases that are part of an availability group, create the master key and certificates, or asymmetric key (EKM) on all secondary replicas before creating the [database encryption key](../../../t-sql/statements/create-database-encryption-key-transact-sql.md) on the primary replica.
259282

260-
<a name="scan-suspend-resume"></a>
283+
If a certificate is used to protect the database encryption key (DEK), [back up the certificate](../../../t-sql/statements/backup-certificate-transact-sql.md) created on the primary replica, and then [create the certificate from a file](../../../t-sql/statements/create-certificate-transact-sql.md) on all secondary replicas before creating the database encryption key on the primary replica.
261284

262-
## Transparent Data Encryption scan
285+
## TDE and FILESTREAM data
263286

264-
To enable TDE on a database, [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] must do an encryption scan. The scan reads each page from the data files into the buffer pool and then writes the encrypted pages back out to disk.
287+
**FILESTREAM** data isn't encrypted even when you enable TDE.
265288

266-
To give you more control over the encryption scan, [!INCLUDE[sql-server-2019](../../../includes/sssqlv15-md.md)] introduces TDE scan, which has a suspend and resume syntax. You can pause the scan while the workload on the system is heavy or during business-critical hours and then resume the scan later.
289+
<a name="scan-suspend-resume"></a>
267290

268-
Use the following syntax to pause the TDE encryption scan:
291+
## Remove TDE
269292

270-
```sql
271-
ALTER DATABASE <db_name> SET ENCRYPTION SUSPEND;
272-
```
273-
274-
Similarly, use the following syntax to resume the TDE encryption scan:
293+
Remove encryption from the database by using the `ALTER DATABASE` statement.
275294

276295
```sql
277-
ALTER DATABASE <db_name> SET ENCRYPTION RESUME;
296+
ALTER DATABASE <db_name> SET ENCRYPTION OFF;
278297
```
279298

280-
The encryption_scan_state column has been added to the sys.dm_database_encryption_keys dynamic management view. It shows the current state of the encryption scan. There's also a new column called encryption_scan_modify_date, which contains the date and time of the last encryption-scan state change.
299+
To view the state of the database, use the [sys.dm_database_encryption_keys](../../../relational-databases/system-dynamic-management-views/sys-dm-database-encryption-keys-transact-sql.md) dynamic management view.
281300

282-
If the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance restarts while its encryption scan is suspended, a message is logged in the error log on startup. The message indicates that an existing scan has been paused.
301+
Wait for decryption to finish before removing the database encryption key by using [DROP DATABASE ENCRYPTION KEY](../../../t-sql/statements/drop-database-encryption-key-transact-sql.md).
302+
303+
> [!IMPORTANT]
304+
> Back up the master key and certificate that are used for TDE to a safe location. The master key and certificate are required to restore backups that were taken when the database was encrypted with TDE. After you remove the database encryption key, take a log backup followed by a fresh full backup of the decrypted database.
283305
284-
## Transparent Data Encryption and buffer pool extension
306+
## TDE and buffer pool extension
285307

286308
When you encrypt a database using TDE, files related to buffer pool extension (BPE) aren't encrypted. For those files, use encryption tools like BitLocker or EFS at the file-system level.
287309

288-
## Transparent Data Encryption and In-Memory OLTP
310+
## TDE and In-Memory OLTP
289311

290312
You can enable TDE on a database that has In-Memory OLTP objects. In [!INCLUDE[ssSQL15](../../../includes/sssql15-md.md)] and [!INCLUDE[ssSDSfull](../../../includes/sssdsfull-md.md)], In-Memory OLTP log records and data are encrypted if you enable TDE. In [!INCLUDE[ssSQL14](../../../includes/sssql14-md.md)], In-Memory OLTP log records are encrypted if you enable TDE, but files in the MEMORY_OPTIMIZED_DATA filegroup are unencrypted.
291313

docs/t-sql/statements/create-sequence-transact-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ SELECT * FROM sys.sequences WHERE name = 'TestSequence' ;
238238

239239
A partial list of the output demonstrates the default values.
240240

241-
| Output | Default values|
241+
| Output | Default value|
242242
|-|-|
243243
|`start_value`|`-9223372036854775808`|
244244
|`increment`|`1`|

0 commit comments

Comments
 (0)