How to fix Warning: The certificate you created is expired
Question : When recovering a certificate created during a CREATE CERTIFICATE I get a "Warning: The certificate you created is expired" message , although the certificate is added to the server. Is this...
View ArticleA simple guide to Hashicorp and SQL Server Secrets Engine
-The Hashicorp database secrets engine (database secrets engine) supports a plugin for SQL Server -It supports root credential rotation, dynamic roles , static roles , username customization -Vault...
View ArticleA simple guide to Transparent Data Encryption in AWS RDS SQL Server
Does AWS RDS SQL Server support built-in SQL Server Transparent Data Encryption (TDE)? Yes , is the short answer , but there are some limitations . Before I dive into the AWS SQL Server RDS TDW...
View ArticleHow to get Cluster File Share Witness sharepath with Powershell
Question: I normally use the Windows reg utility to get the Cluster File Share Witness sharepath information. This is an example command line on a server returning the File Share Witness detailsreg...
View ArticleHow to drop login on AWS RDS SQL Server without sysadmin using Hashicorp Vault
Question: I've read through these two posts - AWS-RDS SQL Server limitations &A simple guide to Hashicorp and SQL Server Secrets Engine . One of the statements in the Hashicorp article is...
View ArticleHow to list logins mapped to a database in SQL Server
Question: I'd like to create a list of SQL Logins\users mapped to a database. Do you have a script which will create this list?Answer: This code uses the undocumented stored procedure...
View ArticleHow to set up SQL Server Column Level Encryption
Question: How do I set up the SQL Server Column Level Encryption ? Answer: The setup for SQL Server Column Level Encryption is an easy process - but it does help to understand the underlying...
View ArticleHow to generate a self signed certificate for SQL Server with...
Use the Powershell cmdlet New-SelfSignedCertificateWarning:I only ever use this method for testing purposes - never use for Production environments. A typical test would be for SQL Server Network...
View ArticleTLS v SSL : which should you use
TLSSSLTransparent Layer Security (TLS)Secure Sockets Layer (SSL)versions: SSL (1.0, 2.0, 3.0)versions:TLS (1.0,1.1,1.2,1.3)Vulnerabilities discovered in all versionsVulnerabilities in 1.0&...
View ArticlePrivacy Policy
Our Privacy Policy was last updated on 23 June 2022.This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and...
View ArticleThe fundamentals of AWS Cloud Security
AWS re:Inforce 2019: The Fundamentals of AWS Cloud Security (FND209-R)I watched an excellent Youtube hosted video related to AWS Cloud Security. Although it's from 2019 - the fundamental principles...
View ArticleTLS versus MTLS: What is the difference
Question: In a recent meeting i heard the term MTLS , what does this mean and what is the difference between Transport Layer Security (TLS) versus Mutual Transport Layer (MTLS)?Answer: Mutual...
View ArticleHelp with Powershell functions
Question: I need some help with a Powershell function to generate some text output based on some imput parameters . Can you supply an example of a Powershell function or possibly including calling a...
View ArticleThe simple guide to column-level encryption
Using a symetric key , how can I encrypt a column in a SQL Server database table? And what are some of the common pitfalls related to setting up column level encryption In summary these are the...
View ArticleColumn-level encryption vs Always encrypted
A common question from developers & data owners is what benefits does Always Encrypted offer over column level encryption aka cell level encryption? First thing to understand is what are the...
View ArticleHashicorp Vault curl for VBA
Question: We have a number of MS Access front ends using DSN connections through ODBC to a PostgreSQL database. All works fine. There is a now a new requirement to no store the PostgreSQL ids in the...
View ArticleReasons for Transaction Log Backup Chain breaking
The SQL Server transaction log backup chain aka log chain is the series of sequential transaction log backups related to a database. The log backups are related to each other and are represented...
View ArticleWhat is horizontal partitioning in SQL Server?
SQL Server Horizontal Partitioning separates a table into multiple tables , all with the same number of columns, but with fewer rows. A typical example is where you might have data - used for monthly...
View ArticleDoes AWS RDS SQL Server support Dynamic Management Views ?
Question: Does AWS RDS SQL Server support Dynamic Management Views ? I want to be able to return memory information , including total server memory and memory pressure Answer: A SQL Server...
View ArticleList Foreign Keys referencing tables in SQL Server
Question: How can I list all Foreign Keys referencing tables and columns within SQL Server tables? Answer: This query will return 6 columnsFOREIGN_KEY = Name of Foreign KeySCHEMA_NAME = Name of...
View Article