Migration of Transparent Database (TDE)
TDE Live Migration
The live migration steps are run on an up and running database.
Before performing the following steps for Live Migration, ensure that DSM backup is successfully restored into the CipherTrust Manager. Add the VKM_mode
parameter and set the corresponding value to no
in cakm_mssql_ekm.properties
file.
Note
Use a key name other than that used with VKM. The user executing the commands below must have credentials mapped to their login with a username/password combination that exists on the CipherTrust Manager and that user must have at least Key Admins privileges.
Fetch the keys from the CipherTrust Manager using the following commands:
Create TDE Login and add credentials.
Rotate the Database Encryption Key (DEK).
Note
<algorithm_name>
used for DEK should be same as that was used with VKM.For Microsoft SQL Server versions 2016 and above, use the below command to rotate the DEK.
Note
Here,
ALTER DATABASE ENCRYPTION KEY REGENERATE WITH ALGORITHM=<algorithm_name>
is optional as it rekeys the database that may take time depending on the resource of the system and the size of the database.For Microsoft SQL Server versions below 2016.
With this, TDE is enabled on
<db_name>
with CAKM for Microsoft SQL EKM provider.
TDE Passive Migration
Passive migration steps are run on a restored MS SQL database backup.
Before performing the following steps for Passive Migration, ensure that DSM backup is successfully restored into the CipherTrust Manager.
Update the
VKM_mode
parameter, set the corresponding value toyes
incakm_mssql_ekm.properties
file, and restart the Microsoft SQL Server Service.Fetch the restored Asymmetric Key from the CipherTrust Manager, using the following commands:
Note
Use a key name other than that was used with VKM.
Create TDE Login and add credentials.
Before restoring the database, ensure that the database backup is copied to the desired Microsoft SQL Server node. Now, restore the database
<db_name>
using the below command.Set the ENCRYPTION OFF for database
<db_name>
.Drop the Database Encryption Key (DEK).
Set the database recovery mode from
FULL
toSIMPLE
.Set the
VKM_Mode
property tono
in thecakm_mssql_ekm.properties
file and restart the Microsoft SQL Server service.Create a new Asymmetric key for the database
<db_name>
.Note
<algorithm_name>
should be same as that was used with VKM.Create new TDE login and credential.
Create a new DEK for the database
<db_name>
.Set the ENCRYPTION ON for database
<db_name>
.Set the database recovery mode from
SIMPLE
toFULL
.With this, TDE is enabled on
<db_name>
with CAKM for Microsoft SQL EKM provider.