473,395 Members | 1,863 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Force protocol encryption on hosted database

I have an sql server 2005 database in a shared host environment. I
have an access database that links to a few of the tables over odbc.
I want to set the server to require that all data be encrypted.

I found this post that seemed to apply

Using Encryption Without Validation
http://msdn.microsoft.com/en-us/library/ms131691.aspx

It looks like I need to set Trust Server Certificate and Force
Protocol Encryption.
The shared environment allows me to execute commands against the
database. I am wondering if there is any way to set the database to
force encryption from this command line?
Jun 27 '08 #1
1 3360
Am Fri, 2 May 2008 09:50:37 -0700 (PDT) schrieb jbot:
...
I want to set the server to require that all data be encrypted.

I found this post that seemed to apply

Using Encryption Without Validation
http://msdn.microsoft.com/en-us/library/ms131691.aspx
Think you mix something up. This is encryption for network traffic, not for
your data! Take a look at this:
http://blogs.technet.com/keithcombs/...24/415079.aspx

bye,
Helmut
Jun 27 '08 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: pigeon | last post by:
SSL only works when ms sql server has "force encryption option" turned on... If I turn that off, and try to have the client software request encryption.. I get a ssl security error msg. The...
4
by: siddurampure | last post by:
PLZ ANYBODY KNOWS WHY ICAP PROTOCOL IS USED?
19
by: Mike Cox | last post by:
Has anyone created something like that for Postgresql? It would be really handy to encrypt credit card numbers and other information so it stays secure. If no one has created anything such as...
7
by: Scott | last post by:
Is there a way to check if the current (web service)connection is using ssl? I'd like to be able to check for this and return an error if the connection isn't secure. I work in a heavily regulated...
1
by: Mark A | last post by:
DB2 ESE 8.2.3 (FP10) for Linux We are experiencing a connection hang of 10 - 15 minutes in the following HADR and automatic client reroute scenario: 01 server is primary database 02 server is...
19
by: klenwell | last post by:
Another request for comments here. I'd like to accomplish something like the scheme outlined at this page here: http://tinyurl.com/3dtcdr In a nutshell, the form uses javascript to hash...
3
by: Bruce | last post by:
How can I encrypt strings using an asymmetric key? I want to encrypt short strings (credit card numbers, etc.) and save the encrypted strings into a database. When accessing the data (i.e. the...
7
by: Alan M Dunsmuir | last post by:
I'm writing a Web application using PHP5 connecting to a MySQL database. I've told the client's application administrator to look after back-ups of the database by using the "Export" option in...
0
jeffstl
by: jeffstl | last post by:
After enabling forced protocol encryption on SQL server there are a handful of crystal reports that have the following error when you try to run them Query Engine Error: '08S01:Communication link...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.