Skip to content

Commit da66393

Browse files
committed
fix: Fix sql server certificates and asymmetric keys
1 parent 6e525e8 commit da66393

1 file changed

Lines changed: 20 additions & 16 deletions

File tree

docs/relational-databases/security/sql-server-certificates-and-asymmetric-keys.md

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: "SQL Server Certificates and Asymmetric Keys"
33
description: Learn about certificates and asymmetric keys in SQL Server, including externally generated or SQL Server generated certificates, tools, and related tasks.
44
author: VanMSFT
55
ms.author: vanto
6-
ms.date: "03/14/2017"
6+
ms.date: "01/22/2026"
7+
ai-usage: ai-assisted
78
ms.service: sql
89
ms.subservice: security
910
ms.topic: conceptual
@@ -16,16 +17,20 @@ monikerRange: ">=aps-pdw-2016 || =azuresqldb-current || =azure-sqldw-latest || >
1617
# SQL Server Certificates and Asymmetric Keys
1718
[!INCLUDE [SQL Server Azure SQL Database Synapse Analytics PDW FabricSQLDB](../../includes/applies-to-version/sql-asdb-asdbmi-asa-pdw-fabricsqldb.md)]
1819

19-
Public Key Cryptography is a form of message secrecy in which a user creates a *public* key and a *private* key. The private key is kept secret, whereas the public key can be distributed to others. Although the keys are mathematically related, the private key cannot be easily derived by using the public key. The public key can be used to encrypt data which only the corresponding private key will be able to decrypt. This can be used for encrypting messages to the owner of the private key. Similarly the owner of a private key can encrypt data which can only be decrypted with the public key. This use forms the basis of digital certificates in which information contained in the certificate is encrypted by the owner of a private key, assuring the author of the contents. Since the encrypting and decrypting keys are different they are known as *asymmetric* keys.
20+
Public Key Cryptography is a form of message secrecy in which a user creates a *public* key and a *private* key. The private key is kept secret, whereas the public key can be distributed to others. Although the keys are mathematically related, the private key can't be easily derived by using the public key.
21+
22+
The public key can be used to encrypt data that only the corresponding private key can decrypt. This usage provides confidentiality when sending encrypted messages to the owner of the private key.
23+
24+
Similarly, the owner of a private key can sign data (encrypt a hash) that can be verified (decrypted) with the public key. This usage forms the basis of digital certificates, in which information contained in the certificate is signed by the owner of a private key, assuring the authenticity of the contents and the identity of the signer. Since the encrypting and decrypting keys are different, they're known as *asymmetric* keys.
2025

21-
Certificates and asymmetric keys are both ways to use asymmetric encryption. Certificates are often used as containers for asymmetric keys because they can contain more information such as expiry dates and issuers. There is no difference between the two mechanisms for the cryptographic algorithm, and no difference in strength given the same key length. Generally, you use a certificate to encrypt other types of encryption keys in a database, or to sign code modules.
26+
Certificates and asymmetric keys are both ways to use asymmetric encryption. Certificates are often used as containers for asymmetric keys because they can contain more information, such as expiry dates and issuers. There's no difference between the two mechanisms for the cryptographic algorithm, and no difference in strength given the same key length. Generally, you use a certificate to encrypt other types of encryption keys in a database or to sign code modules.
2227

2328
Certificates and asymmetric keys can decrypt data that the other encrypts. Generally, you use asymmetric encryption to encrypt a symmetric key for storage in a database.
2429

25-
A public key does not have a particular format like a certificate would have, and you cannot export it to a file.
30+
A public key doesn't have a particular format like a certificate would have, and you can't export it to a file.
2631

2732
> [!NOTE]
28-
> [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] contains features that enable you to create and manage certificates and keys for use with the server and database. [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] cannot be used to create and manage certificates and keys with other applications or in the operating system.
33+
> [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] contains features that enable you to create and manage certificates and keys for use with the server and database. [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] can't be used to create and manage certificates and keys with other applications or in the operating system.
2934
3035
## Certificates
3136
A certificate is a digitally signed security object that contains a public (and optionally a private) key for [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)]. You can use externally generated certificates or [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] can generate certificates.
@@ -47,7 +52,7 @@ monikerRange: ">=aps-pdw-2016 || =azuresqldb-current || =azure-sqldw-latest || >
4752
## Asymmetric Keys
4853
Asymmetric keys are used for securing symmetric keys. They can also be used for limited data encryption and to digitally sign database objects. An asymmetric key consists of a private key and a corresponding public key. For more information about asymmetric keys, see [CREATE ASYMMETRIC KEY (Transact-SQL)](../../t-sql/statements/create-asymmetric-key-transact-sql.md).
4954

50-
Asymmetric keys can be imported from strong name key files, but they cannot be exported. They also do not have expiry options. Asymmetric keys cannot encrypt connections.
55+
Asymmetric keys can be imported from strong name key files, but they can't be exported. They also don't have expiry options. Asymmetric keys can't encrypt connections.
5156

5257
### Using an Asymmetric Key in SQL Server
5358
Asymmetric keys can be used to help secure data or sign plaintext. The following table lists additional resources for asymmetric keys in [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)].
@@ -66,15 +71,14 @@ monikerRange: ">=aps-pdw-2016 || =azuresqldb-current || =azure-sqldw-latest || >
6671
|[makecert](/windows/desktop/SecCrypto/makecert)|Creates certificates. Deprecated in favor of **New-SelfSignedCertificate**.|
6772
|[sn](/dotnet/framework/tools/sn-exe-strong-name-tool)|Creates strong names for symmetric keys.|
6873

69-
## Related Tasks
70-
[Choose an Encryption Algorithm](../../relational-databases/security/encryption/choose-an-encryption-algorithm.md)
71-
72-
[CREATE SYMMETRIC KEY (Transact-SQL)](../../t-sql/statements/create-symmetric-key-transact-sql.md)
73-
74-
[CREATE CERTIFICATE (Transact-SQL)](../../t-sql/statements/create-certificate-transact-sql.md)
75-
76-
## See Also
77-
[sys.certificates (Transact-SQL)](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md)
78-
[Transparent Data Encryption (TDE)](../../relational-databases/security/encryption/transparent-data-encryption.md)
74+
## Related content
75+
76+
- [Choose an Encryption Algorithm](../../relational-databases/security/encryption/choose-an-encryption-algorithm.md)
7977

78+
- [CREATE SYMMETRIC KEY (Transact-SQL)](../../t-sql/statements/create-symmetric-key-transact-sql.md)
8079

80+
- [CREATE CERTIFICATE (Transact-SQL)](../../t-sql/statements/create-certificate-transact-sql.md)
81+
82+
- [sys.certificates (Transact-SQL)](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md)
83+
84+
- [Transparent Data Encryption (TDE)](../../relational-databases/security/encryption/transparent-data-encryption.md)

0 commit comments

Comments
 (0)