-
Notifications
You must be signed in to change notification settings - Fork 435
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Always Encrypted with JDBC #303
Comments
Hi @lushoumei, thanks for filing this issue. For point #2 - can you please confirm you are using SQL Server 2016 and up? We'll follow up with the rest of the issues shortly. |
Hi Andrea Lam,
Yes, we use SQL Server 2017.
Best regards
From: Andrea Lam [mailto:[email protected]]
Sent: Wednesday, May 24, 2017 1:41 AM
To: Microsoft/mssql-jdbc
Cc: Lu, Shoumei; Mention
Subject: Re: [Microsoft/mssql-jdbc] Always Encrypted with JDBC (#303)
Hi @lushoumei<https://github.com/lushoumei>, thanks for filing this issue. For point #2<#2> - can you please confirm you are using SQL Server 2016 and up?
We'll follow up with the rest of the issues shortly.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#303 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AbdkTZsZvapvMiytkmaSwUAFCa0kEUXJks5r8xovgaJpZM4Nf-zL>.
|
Sorry, we use Azure SQL Database. |
@lushoumei Always Encrypted is supported by Microsoft SQL Azure V12 and above. Can you confirm the Azure version in use with T-SQL |
Hi @ajlam & @v-suhame, |
Hello @lushoumei @v-fmeng I'm wondering some information of the client machine that the program is running on. Is it a VM on Azure? If the client machie is a VM on Azure cloud, please make sure to use version 6.1.2 or above. We fixed one issue related to using ColumnEncryption on Azure VM #65 . We just realized Point 2 (with driver 6.1.0) could be related to this issue. |
I guess I found the reason. the client code needs to register the key store by calling: To get rid of the error: please use AKV 0.9.7 (and JDBC 6.1.2 or above if on Azure VM), and add the following code after creating
|
The client machine is a VM on Azure cloud and the version is right. We did use AKV 0.9.7 and JDBC 6.1.7.jre8-preview, and we also added the code you offered, but when we tried, it also occurred [Invalid key store provider name: AZURE_KEY_VAULT."] |
what version of OS does the VM have? Could you please also copy the full error stack? I modified the code you provided a little bit and it is working for me now, could you please run the following code and give us the full error stack? Please make sure to use key vault after Thank you.
|
Hi all, |
Thank you for your reply. We are closing this issue now :) |
Hi there, I'm facing the same issue but I use MS SQL Certificate Store. Can you please suggest if the same should work for me as well ? |
(1)when we use the following two jars:
[com.microsoft.sqlserver-mssql-jdbc-6.1.0.jre8 and com.microsoft.azure-azure-keyvault-1.0.0]
it occurs "Failed to decrypt a column encryption key. Invalid key store provider name: AZURE_KEY_VAULT."
(2) Then we changed [com.microsoft.azure-azure-keyvault-1.0.0] to [com.microsoft.azure-azure-keyvault-0.9.7]
it occurs "Could not open JDBC Connection for transaction; nested exception is com.microsoft.sqlserver.jdbc.SQLServerException: SQL Server instance in use does not support column encryption. "
(3)Finally, we changed [com.microsoft.sqlserver-mssql-jdbc-6.1.0.jre8] to [com.microsoft.sqlserver-mssql-jdbc-6.1.7.jre8-preview], it occurs the same problem as the (1).
(4)The java code we use is:
So,which version should we use to solve the problem.
The text was updated successfully, but these errors were encountered: