tag:blogger.com,1999:blog-8058503559984718890.post9137557047852431252..comments2023-06-23T04:07:07.081-07:00Comments on Curion: Encrypted SQL Server SSIS ConfigurationsLarry Charltonhttp://www.blogger.com/profile/05688437511573656711noreply@blogger.comBlogger12125tag:blogger.com,1999:blog-8058503559984718890.post-71578696427024464512012-07-25T12:21:34.695-07:002012-07-25T12:21:34.695-07:00This comment has been removed by the author.Anonymoushttps://www.blogger.com/profile/18071599753102985389noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-4343168752677174962012-07-25T12:19:49.582-07:002012-07-25T12:19:49.582-07:00This comment has been removed by the author.Anonymoushttps://www.blogger.com/profile/18071599753102985389noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-20234493418331445222012-07-09T02:35:13.925-07:002012-07-09T02:35:13.925-07:00Time to turn on Spam filtering me thinks!Time to turn on Spam filtering me thinks!David Bridgehttps://www.blogger.com/profile/16620345882286902360noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-30687959107752523592010-05-11T02:39:12.857-07:002010-05-11T02:39:12.857-07:00It's really a very interesting article. Hope i...It's really a very interesting article. Hope it will be helpful for all developers those are working on SQL. <a href="http://www.adminkernel.com/networking-articles/" rel="nofollow"> This </a> gives the more information about on this.Amithttps://www.blogger.com/profile/10143457579892180388noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-64145827028555821842010-03-19T01:41:50.843-07:002010-03-19T01:41:50.843-07:00If you are working on SQL Server Integration Servi...If you are working on SQL Server Integration Service (SSIS) packages, it is highly unlikely that you are working in the production environment directly. Alternatively, you might be working in the development environment and later deploying to the production environment. Apart from these environments, you normally have testing and staging environments as well. For all these cases you probably have different servers and folders to work with.<br /><br />Recently I just came across a good articles on " Windows Server"<br /><a href="http://www.adminkernel.com/windows-server/" rel="nofollow">Here is its link.</a>Sumanthttps://www.blogger.com/profile/11824801392530480579noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-92218073429598558752010-01-16T17:04:15.746-08:002010-01-16T17:04:15.746-08:00Is this code still available for download somewher...Is this code still available for download somewhere?<br />Thanks for any help.Unknownhttps://www.blogger.com/profile/02418017633005267873noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-72794114332462349332008-07-23T03:02:00.000-07:002008-07-23T03:02:00.000-07:00Using Encrypted configurations is no different tha...Using Encrypted configurations is no different than using unencrypted configurations both at run-time and design time. So you can either have specific single configurations or set environment variables to choose your configuration (might be a few others).<BR/><BR/>The only thing that's important is that whatever account is attempting to access or update the configuration needs to have access.Larry Charltonhttps://www.blogger.com/profile/05423158273191177724noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-73561044674966648072008-07-18T16:58:00.000-07:002008-07-18T16:58:00.000-07:00Having stored your configs in SQL Server how can I...Having stored your configs in SQL Server how can I select a config when setting up a job in SQL ServerMycrof Holmeshttps://www.blogger.com/profile/08464340741922714086noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-11136039820897228562008-02-22T10:09:00.000-08:002008-02-22T10:09:00.000-08:00create the VIEW first and then create INSERT, UPDA...create the VIEW first and then create INSERT, UPDATE, and DELETE as triggers for the VIEW. That helps.... <BR/><BR/> <BR/><BR/>Its working now. dont create the triggers on the configuration table. since i was renaming the table to follow our standards i just lost track of where i was creating themchuckcycleshttps://www.blogger.com/profile/07939609901914724269noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-30845392043397050902008-02-04T13:58:00.000-08:002008-02-04T13:58:00.000-08:00As presented only the accounts in the view will ev...As presented only the accounts in the view will ever have access to the data. The "achilles" heel of this is that if a hacker can guess the account names that have access, they can move the database to another network and created accounts with the exact same names to access the data. Otherwise the data won't be accessible.<BR/><BR/>A better way is to use transparent decryption with certificates. Then without the original password used to add the certificate to the server, no one can access the data.Larry Charltonhttps://www.blogger.com/profile/05423158273191177724noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-30479046267688651602008-01-31T01:33:00.000-08:002008-01-31T01:33:00.000-08:00Great!But one question, how do I prevent others to...Great!<BR/>But one question, how do I prevent others to access the information throw the view?Unknownhttps://www.blogger.com/profile/06937383058667701849noreply@blogger.comtag:blogger.com,1999:blog-8058503559984718890.post-35438204475957320222007-12-21T01:00:00.000-08:002007-12-21T01:00:00.000-08:00Thanks for the excellent article.Saved me a lot of...Thanks for the excellent article.<BR/><BR/>Saved me a lot of time!!Jasonhttps://www.blogger.com/profile/06497027882605914777noreply@blogger.com