You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/connect/homepage-sql-connection-programming.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: "Homepage for SQL client programming | Microsoft Docs"
3
3
description: "Hub page with annotated links to downloads and documentation for numerous combinations of languages and operating systems, for connecting to SQL Server or to Azure SQL Database."
The [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/) in SSMS is powered by the Microsoft PROSE SDK, which is a framework for automatic programming or data wrangling from input-output examples. Although the Wizard can convert most Flat File sources, the PROSE team will consider updates to their algorithm based on any failures you experience.
25
+
The [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/) in SSMS is powered by the [Microsoft PROSE SDK](https://microsoft.github.io/prose/), which is a framework for automatic programming or data wrangling from input-output examples. Although the Wizard can convert most Flat File sources, the PROSE team will consider updates to their algorithm based on any failures you experience.
26
26
27
27
## Send an email
28
28
29
29
If you run into an import failure or have a suggestion for feature improvement, send an email to sqltoolsprosesupport@microsoft.com
30
30
31
31
In this email:
32
32
- Include which version of SSMS you are running (**Help** -> **About**)
33
-
- Attach a snippet/sample of your flat file (**Do not include any Personal identifiable information (PII)**)
33
+
- Attach a snippet/sample of your flat file, say the first few lines including column names (**Do not include any Personal identifiable information (PII)**)
34
34
- Brief description of the error you are running into and how you would like it to behave
35
35
36
36
Sending this sample helps improve the Import Flat File Wizard experience since this information is directly sent to the PROSE team. Thank you for your help.
@@ -39,5 +39,5 @@ Sending this sample helps improve the Import Flat File Wizard experience since t
39
39
40
40
Learn more about the wizard.
41
41
42
-
-**Learn more about the Import Flat File Wizard** If you are looking for an overview of the Import Flat File wizard, see [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/).
42
+
-**Learn more about the Import Flat File Wizard.** If you are looking for an overview of the Import Flat File wizard, see [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/).
43
43
-**Learn more about PROSE.** If you are looking for an overview of the intelligent framework used by this wizard, see [PROSE SDK](https://microsoft.github.io/prose/).
Copy file name to clipboardExpand all lines: docs/relational-databases/security/encryption/transparent-data-encryption-azure-sql.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,9 @@ Microsoft also seamlessly moves and manages the keys as needed for geo-replicati
42
42
> All newly created SQL databases are encrypted by default by using service-managed transparent data encryption. Existing databases before May 2017 and databases created through restore, geo-replication, and database copy aren't encrypted by default.
43
43
>
44
44
45
-
## Bring Your Own Key (preview)
45
+
## Bring Your Own Key
46
46
47
-
With Bring Your Own Key (in preview) support, you can take control over your transparent data encryption keys and control who can access them and when. Key Vault, which is the Azure cloud-based external key management system, is the first key management service that transparent data encryption has integrated with Bring Your Own Key support. With Bring Your Own Key support, the database encryption key is protected by an asymmetric key stored in Key Vault. The asymmetric key never leaves Key Vault. After the server has permissions to a key vault, the server sends basic key operation requests to it through Key Vault. You set the asymmetric key at the server level, and all databases under that server inherit it.
47
+
With Bring Your Own Key support, you can take control over your transparent data encryption keys and control who can access them and when. Key Vault, which is the Azure cloud-based external key management system, is the first key management service that transparent data encryption has integrated with Bring Your Own Key support. With Bring Your Own Key support, the database encryption key is protected by an asymmetric key stored in Key Vault. The asymmetric key never leaves Key Vault. After the server has permissions to a key vault, the server sends basic key operation requests to it through Key Vault. You set the asymmetric key at the server level, and all databases under that server inherit it.
48
48
49
49
With Bring Your Own Key support, you now can control key management tasks such as key rotations and key vault permissions. You also can delete keys and enable auditing/reporting on all encryption keys. Key Vault provides central key management and uses tightly monitored hardware security modules. Key Vault promotes separation of management of keys and data to help meet regulatory compliance. To learn more about Key Vault, see the [Key Vault documentation page](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault).
This how-to guide walks through how to use a key from Azure Key Vault for Transparent Data Encryption (TDE) (in preview) on a SQL Database or Data Warehouse. To learn more about the TDE with Bring Your Own Key (BYOK) Support (in preview), visit [TDE Bring Your Own Key to Azure SQL](transparent-data-encryption-byok-azure-sql.md).
28
+
This how-to guide walks through how to use a key from Azure Key Vault for Transparent Data Encryption (TDE) on a SQL Database or Data Warehouse. To learn more about the TDE with Bring Your Own Key (BYOK) Support, visit [TDE Bring Your Own Key to Azure SQL](transparent-data-encryption-byok-azure-sql.md).
Bring Your Own Key (BYOK) support for [Transparent Data Encryption (TDE)](transparent-data-encryption.md) allows you to encrypt the Database Encryption Key (DEK) with an asymmetric key called TDE Protector. The TDE Protector is stored under your control in [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), Azure’s cloud-based external key management system. Azure Key Vault is the first key management service with which TDE has integrated support for BYOK. The TDE DEK, which is stored on the boot page of a database is encrypted and decrypted by the TDE protector. The TDE Protector is stored in Azure Key Vault and never leaves the key vault. If the server's access to the key vault is revoked, a database cannot be decrypted and read into memory. The TDE protector is set at the logical server level and is inherited by all databases associated with that server.
@@ -120,7 +120,8 @@ The following section will go over the setup and configuration steps in more det
- Create two Azure Key Vaults in two different regions using [PowerShell to enable the “soft-delete” property](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-soft-delete-powershell) on the key vaults (this option is not available from the AKV Portal yet – but required by SQL)
123
+
- Create two Azure Key Vaults in two different regions using [PowerShell to enable the “soft-delete” property](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-soft-delete-powershell) on the key vaults (this option is not available from the AKV Portal yet – but required by SQL).
124
+
- Both Azure Key Vaults must be located in the two regions available in the same Azure Geo in order for backup and restore of keys to work. If you need the two key vaults to be located in different geos to meet SQL Geo-DR requirements, follow the [BYOK Process](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-hsm-protected-keys) that allows keys to be imported from an on-prem HSM.
Copy file name to clipboardExpand all lines: docs/sql-server/stretch-database/stretch-database.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ ms.workload: "On Demand"
45
45
Enjoy peace of mind as you stretch your most important applications securely to the cloud. SQL Server’s Always Encrypted provides encryption for your data in motion. Row Level Security (RLS) and other advanced SQL Server security features also work with Stretch Database to protect your data.
46
46
47
47
## What does Stretch Database do?
48
-
After you enable Stretch Database for a SQL Server instance, a database, and at least one table, Stretch Database silently begins to migrate your cold data to Azure.
48
+
After you enable Stretch Database for a SQL Server instance, a database, and select at least one table, Stretch Database silently begins to migrate your cold data to Azure.
49
49
50
50
- If you store cold data in a separate table, you can migrate the entire table.
Is the ID of the certificate. *Cert_ID* is an int.
50
+
The certificate ID value, of data type int.
51
51
52
52
*Expiry_Date*
53
-
Is the date of expiration of the certificate.
53
+
The certificate expiration date.
54
54
55
55
*Start_Date*
56
-
Is the date when the certificate becomes valid.
56
+
The date when the certificate becomes valid.
57
57
58
58
*Issuer_Name*
59
-
Is the issuer name of the certificate.
59
+
The name of the certificate issuer.
60
60
61
61
*Cert_Serial_Number*
62
-
Is the certificate serial number.
62
+
The certificate serial number.
63
63
64
64
*Subject*
65
-
Is the subject of the certificate.
65
+
The certificate subject.
66
66
67
67
*SID*
68
-
Is the SID of the certificate. This is also the SID of any login or user mapped to this certificate.
68
+
The certificate SID. This is also the SID of any login or user mapped to this certificate.
69
69
70
70
*String_SID*
71
-
Is the SID of the certificate as a character string. This is also the SID of any login or user mapped to the certificate.
71
+
The SID of the certificate as a character string. This is also the SID of any login or user mapped to the certificate.
72
72
73
73
## Return types
74
-
The property specification must be enclosed in single quotation marks.
74
+
Single quotation marks must enclose the property specification.
75
75
76
-
The return type depends on the property that is specified in the function call. All return values are wrapped in the return type of **sql_variant**.
76
+
The return type depends on the property specified in the function call. The return type **sql_variant** wraps all return values.
77
77
-*Expiry_Date* and *Start_Date* return **datetime**.
78
-
-*Cert_Serial_Number*, *Issuer_Name*, *Subject*, and *String_SID* return **nvarchar**.
78
+
-*Cert_Serial_Number*, *Issuer_Name*, *String_SID*, and *Subject* all return **nvarchar**.
79
79
-*SID* returns **varbinary**.
80
80
81
81
## Remarks
82
-
Information about certificates is visible in the [sys.certificates](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md) catalog view.
82
+
See certificate information in the [sys.certificates](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md) catalog view.
83
83
84
84
## Permissions
85
-
Requires some permission on the certificate and that the caller has not been denied VIEW DEFINITION permission on the certificate.
85
+
Requires appropriate permission(s) on the certificate, and requires that the caller has not been denied VIEW permission on the certificate. See [CREATE CERTIFICATE (Transact-SQL)](../../t-sql/statements/create-certificate-transact-sql.md) and [GRANT CERTIFICATE PERMISSIONS (Transact-SQL)](../../t-sql/statements/grant-certificate-permissions-transact-sql.md) for more information about certificate permissions.
86
86
87
87
## Examples
88
88
The following example returns the certificate subject.
@@ -91,7 +91,7 @@ The following example returns the certificate subject.
0 commit comments