Column Level Encryption
Create Provider and Credentials for Migration
Note
Before performing the following steps, ensure that DSM keys backup is successfully restored on the CipherTrust Manager and VKM_MODE
is set to no
in the cakm_mssql_ekm.properties
file.
Create the provider and credentials for the user, using the below commands. In this document, we are using the user "sa".
CLE Live Migration
The live migration steps are run on an up and running database.
Fetch the restored Asymmetric and Symmetric Keys from the CipherTrust Manager, using the following commands:
Note
Use a key name other than that was used with VKM.
Fetching Asymmetric Key
Fetching Symmetric Key
To encrypt and decrypt the data using the keys fetched above, run the below commands.
It is assummed that a table<table_name>
already exists in the database.Encryption and decryption using Asymmetric key
<new_asym_key_name>
Encryption and decryption using Symmetric key
<new_sym_key_name>
With that you are done encrypting and decrypting the column.
CLE Passive Migration
Passive migration steps are run on a restored MS SQL database backup.
Before proceeding with passive migration, ensure that the database backup is copied to the desired Microsoft SQL Server node.
To restore the database for Column level encryption and decryption, run the below command.
Fetch the restored Asymmetric and Symmetric Keys from the CipherTrust Manager, using the following commands:
Note
Use a key name other than that was used with VKM.
Fetching Asymmetric Key
Fetching Symmetric Key
To encrypt data using the keys fetched above, run the below commands. It is assumed that a table
<table_name>
already exists in the database.Encryption and decryption using Asymmetric Key
<new_asym_key_name>
Encryption and decryption using Symmetric key
<new_sym_key_name>
With that you are done encrypting the column.