17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 – Transparent Data EncryptionFigure 6-3: Search Results in Encrypted Backup File.One final test in regard to the backup file is to attempt to restore the post-TDEbackup file onto a different instance than the one in which the HomeLendingdatabase resides, using the RESTORE DATABASE command, as shown inListing 6-10.USE master;GORESTORE DATABASE HomeLendingFROM DISK ='D:\HomeLending\Backup\HomeLending_PostTDE.bak'WITH FILE = 1,NOUNLOAD,REPLACE,STATS = 10GOListing 6-10: Attempting to restore the HomeLending database.This attempt will return an error message that states that the certificate at theMaster database level, in which the HomeLending database encryption keyis protected, does not exist; therefore the attempt will fail.Msg 33111, Level 16, State 3, Line 2Cannot find server certifiate with thumbprint…Msg 3013, Level 16, State 3, Line 2RESTORE DATABASE is terminating abnormallyUsing EXECUTE ASFinally, we can perform a test to determine that the data that is containedwithin the encrypted HomeLending database files can be read by valid usersof the database, as shown in Listing 6-11. As described previously in Chapter5, we use EXECUTE AS USER to impersonate various users within the database142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!