PANTHEON™ manual

 Categories
[Expand]User Manual for DataLab PANTHEON 5.5
 No formula defined!
[Collapse]Datalab PANTHEON 5.5 Guide
 [Expand]Orders
 [Expand]Settings
 [Expand]Manufacturing
 [Expand]Goods
 [Expand]Service
 [Expand]Financials
 [Expand]Personnel
 [Expand]ZEUS Business Intelligence System
 [Expand]Desktop
  Web Portals
  Extra
 [Collapse]Datalab Software System Environment
  [Expand]Security Policy
  [Collapse]Installation
    Windows Vista
    Windows Terminal Server
    Installing PANTHEON on Linux and Oracle Database
   [Collapse]MS SQL Server
     MS SQL Server Installation
     Changing SQL Sort Order
     SQL Server Agent
    [Collapse]MS SQL Server Security
      Windows Authentication
      SQL Server Authentication
      Creating Server Logins
      Fixed Server Role
      Fixed Database Role
      SQL Server Service Settings
      Encrypting SQL Server Connections
    [Expand]Useful SQL Queries
   [Expand]Oracle Database
   [Expand]ODBC
  [Expand]Task Scheduling
  [Expand]PANTHEON System Environment
  [Expand]Datalab Utilities
  [Expand]Database Administration
 [Expand]Messages and Warnings
 [Expand]Additional Programs
 Opening or closing round bracket missing!
 Debugging Formulas
[Expand]Testing and Debugging Formulas
 Opening or closing square bracket missing!
 Conditional statement at position x not enclosed in square brackets!
 Syntax error in conditional statement. Correct syntax is [condition:value]
 Adjacent operators (xx)!
 Last character of the formula is an operator!
 Variable not enclosed in hashes (#)!
 Illegal characters: xyz
 Unknown error!
[Expand]User Manual for Datalab PANTHEON Farming
[Expand]User Site
 Adjacent hashes!
 The line number must be an integer (#xx#)!
 The first character of #xx# must be a transaction type or a column mark!
 The first character of #xx# must be an operation type (R, S, O or A)!
 The second character of #xx# must be a transaction type (D, K, S, P, or O)!
 Variable not defined
[Expand]Kralicek Quicktest Financial Ratios

Load Time: 421.8963 ms
print   |
Label

Encrypting SQL Server Connections

Encrypting SQL Server Connections

Encrypting SQL Server Connections

By default, the connection between the database server and the client is not encrypted, making it possible to tap into the communication channel and read data. This poses a great security risk, even for non-critical data.

The connection can be encrypted by employing VPN connections between the server and the client, but SQL Server itself has some encryption mechanisms that prevent anauthorized access. Two methods will be covered here. The first is simpler, while the second is more complex, but offers more control over the level of security.

 

Simple Method without Security Certificate

Run SQL Server Configuration Manager. In SQL Server 2005 Network Configuration, open the Properties  for Protocols for SQL2005. Set ForceEncryption to Yes.

065176.gif

 

Set ForceEncryption to Yes

065177.gif

 

Restart the SQL Server instance for the change to take effect.

Now SQL Server will automatically generate a certificate. Because clients using Windows operating systems already have the required Microsoft keys installed, their connections to that SQL Server instance will be encrypted.

The downside of this method is that you cannot configure the encryption mode. Furthermore, all connections to the SQL Server instance are encrypted, which might not be desirable for local connections.

When using this method, make sure that you are not running PANTHEON with the /SSL switch. This is used only for the second method.

Complex Method with Security Certificate

With this method, the ForceEncryption property mentioned above must be No.

065178.gif

 

In the Certificate tab, select a certificate, which you have to acquire from a Certificate Authority (CA), VeriSign for example. Specify the FQDN (Fully qualified domain name) of the SQL Server instance if clients outside the local network will be connecting to it. For local use the local name of the SQL Server instance is sufficient.

065179.gif

 

Note that if you get a certificate from one of the established certificate authorities, clients will most likely have the relevant keys already installed.

If you already have a certificate, run PANTHEON with the /SSL switch and its connection to the server will be encrypted. More information about the /SSL switch can be found in Command Line Parameters.

You can prepare a certificate and matching keys yourself. For this you need Certificate Services installed, which is part of Windows 2003 Server. In Internet Explorer, navigate to http://Local/CertSrv which opens a certificate management page. In this example, the certificate authority is called ProdIT, which is also the certificate issuer.

Click Request a certificate.

065180.gif

 

Then click advanced certificate request.

065181.gif

 

And finally Create and submit request to this CA.

065182.gif

 

On the Advanced Certificate Request page, enter the server instance's fully qualified domain name if you want it to be accessible from outside the local network. Otherwise, the local name is sufficient. In Type of Certificate Needed, select Server Authentication Certificate. Also select a key size. Make sure you select Store certificate in the local computer certificate store. You can also specify a friendly name for the certificate (MS SQL Certificate in this example).

Click Submit after you have set all the options.

065183.gif

 

After submitting the request, open the Microsoft Managment Console (MMC), add the Certification Authority snap-in, and activate it by selecting Issue in the context menu.

065184.gif

 

After activating the certificate in the Management Console, return to Certificate Services. Click View the status of a pending certificate request to check the certificate's status.

065185.gif

 

Select your certificate.

065186.gif

 

If the certificate has been issued successfully, click Install this certfificate.

065187.gif

 

After the certificate has been installed, you can select it in SQL Server Configuration Manager.

065188.gif

 

In order for clients to be able to establish a secure connection, they have to install a certificate key, which you have to export first.

Open the Microsoft Managment Console (MMC), add the Certificates snap-in, find your certificate in the Personal folder, and export it from the context menu.

065189.gif

 

Make sure to select Cryptographic Message Syntax Standard- PKCS #7 Certificates (.P7B) and enable the option Include all certificates in the certification path if possible.

065190.gif

 

Clients can then install the exported certificate, either by right-clicking the file and selecting Install Certificate, or through Internet Explorer. In the Certificate Import Wizard, it is recommended to select  the option Automatically select the certificate store based in the type of certificate. Alternatively, you can select the certificate storage manually. If you do, select Trusted Root Certification Authorities.

065191.gif

 

If import is successful, clients should see your certificate authority (ProdIT in this example) among Trusted Root Certification Authorities.

065192.gif

 

Clients starting PANTHEON with the /SSL switch should now eastablish an encrypted connection to the server.




Rate this topic
Was this topic usefull?
Comments
Comment will also bo visible in forum!