Page 99 - DCAP508_DATABASE_ADMINISTRATION
P. 99

Unit 6: SQL Server Authentication




          The following illustration shows the same information in an alternative manner.       Notes
                                            Figure 6.5

































































          This diagram illustrates the following additional concepts:

               In this illustration, arrows indicate common encryption hierarchies.
               Symmetric and asymmetric keys in the EKM can protect access to the symmetric and
               asymmetric keys stored in SQL Server. The dotted line associated with EKM indicates that
               keys in the EKM could replace the symmetric and asymmetric keys stored in SQL Server.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   93
   94   95   96   97   98   99   100   101   102   103   104