Setting encryption dependencies

The system security officer must grant you permission for working with encryption keys.

The Encryption Keys folder is located in the database folder. Use the Encryption Keys folder to add new keys, and alter or delete existing keys on the database.

The encryption key dependencies are usually set when the column is encrypted with the key.

StepsAccessing encryption-key properties

  1. In the server, click Databases to display a list of available databases.

  2. Double-click the database you want.

  3. Click the Encryption Keys folder in the database to display the list of encryption keys for the selected database.

  4. Right-click the key and select Properties for information on that column.

  5. There are two tabs:

Click Dependencies at the bottom of the General tab window. The Dependencies window appears with a list of all columns in the database that are encrypted with the selected key.