Edit

Share via


Extensible Key Management using Azure Key Vault (SQL Server)

Applies to: SQL Server

The SQL Server Connector for Azure Key Vault enables SQL Server encryption to use the Azure Key Vault service as an Extensible Key Management (EKM) provider to protect SQL Server encryption keys.

This article describes the SQL Server connector. More information is available in:

What is Extensible Key Management (EKM) and why use it?

SQL Server provides several types of encryption that help protect sensitive data, including Transparent data encryption (TDE), Encrypt a Column of Data (CLE), and Backup encryption. In all of these cases, in this traditional key hierarchy, the data is encrypted using a symmetric data encryption key (DEK). The symmetric data encryption key is further protected by encrypting it with a hierarchy of keys stored in SQL Server.

Instead of this model, the alternative is the EKM Provider Model. Using the EKM provider architecture enables SQL Server to protect the data encryption keys by using an asymmetric key stored outside of SQL Server in an external cryptographic provider. This model adds an additional layer of security and separates the management of keys and data.

The following image compares the traditional service-manage key hierarchy with the Azure Key Vault system.

Diagram that compares the traditional service-manage key hierarchy with the Azure Key Vault system.

The SQL Server Connector serves as a bridge between SQL Server and Azure Key Vault, so SQL Server can use the scalability, high performance, and high availability of the Azure Key Vault service. The following image represents how the key hierarchy works in the EKM provider architecture with Azure Key Vault and SQL Server Connector.

Azure Key Vault can be used with SQL Server installations on Azure Virtual Machines and for on-premises servers. The key vault service also provides the option to use tightly controlled and monitored Hardware Security Modules (HSMs) for a higher level of protection for asymmetric encryption keys. For more information about the key vault, see Azure Key Vault.

Note

Only Azure Key Vault and Azure Key Vault Managed HSM are supported. Azure Cloud HSM isn't supported.

The following image summarizes the process flow of EKM using the key vault. (The process step numbers in the image aren't meant to match the setup step numbers that follow the image.)

Screenshot of SQL Server EKM using the Azure Key Vault.

Note

Versions 1.0.0.440 and older are no longer supported in production environments. Upgrade to version 1.0.1.0 or a later version by visiting the Microsoft Download Center and using the instructions on the SQL Server Connector Maintenance & Troubleshooting page under "Upgrade of SQL Server Connector."

For the next step, see Set up SQL Server TDE Extensible Key Management by using Azure Key Vault.

For use scenarios, see Use SQL Server Connector with SQL Encryption Features.