--- layout: docs page_title: Install Vault EKM Provider description: Installation steps for the Vault EKM Provider for Microsoft SQL Server. --- # Installing the Vault EKM Provider ## Prerequisites * Vault Enterprise server 1.9+ with a license for the Advanced Data Protection Key Management module * Microsoft SQL Server for Windows (SQL Server for Linux [does not support EKM][linux-ekm]) * An authenticated Vault client To check your Vault version and license, you can run: ```bash vault status vault license get -format=json ``` The list of features should include "Key Management Transparent Data Encryption". [linux-ekm]: https://docs.microsoft.com/en-us/sql/linux/sql-server-linux-editions-and-components-2019?view=sql-server-ver15#Unsupported ## Installing the Vault EKM provider ## Configuring Vault The EKM provider requires AppRole auth and the Transit secret engine to be setup on the Vault server. The steps below can be used to configure Vault ready for the EKM provider to use it. -> **Note:** The first release of the Vault EKM provider does not support custom mount paths or namespaces for the AppRole and Transit engines. -> **Note:** rsa-2048 is currently the only supported key type. 1. Set up AppRole auth: ```bash vault auth enable approle vault write auth/approle/role/tde-role \ token_ttl=20m \ max_token_ttl=30m \ token_policies=tde-policy ``` 1. Retrieve the AppRole ID and secret ID for use later when configuring SQL Server: ```bash vault read auth/approle/role/ekm-encryption-key-role/role-id vault write -f auth/approle/role/ekm-encryption-key-role/secret-id ``` 1. Enable the transit secret engine and create a key: ```bash vault secrets enable transit vault write -f transit/keys/ekm-encryption-key type="rsa-2048" ``` 1. Create a policy for the Vault EKM provider to use. The following policy has the minimum required permissions: ```bash vault policy write tde-policy -< and with the values from -- the earlier vault commands: -- vault read auth/approle/role/ekm-encryption-key-role/role-id -- vault write -f auth/approle/role/ekm-encryption-key-role/secret-id CREATE CREDENTIAL TransitVaultCredentials WITH IDENTITY = '', SECRET = '' FOR CRYPTOGRAPHIC PROVIDER TransitVaultProvider; GO -- Replace \ with the SQL Server administrator's login ALTER LOGIN "\" ADD CREDENTIAL TransitVaultCredentials; ``` 1. You can now create an asymmetric key using the transit key set up earlier: ```sql CREATE ASYMMETRIC KEY TransitVaultAsymmetric FROM PROVIDER TransitVaultProvider WITH CREATION_DISPOSITION = OPEN_EXISTING, PROVIDER_KEY_NAME = 'ekm-encryption-key'; ``` 1. Create another login from the new asymmetric key: ```sql -- Replace and with the values from -- the earlier vault commands again CREATE CREDENTIAL TransitVaultTDECredentials WITH IDENTITY = '', SECRET = '' FOR CRYPTOGRAPHIC PROVIDER TransitVaultProvider; GO CREATE LOGIN TransitVaultTDELogin FROM ASYMMETRIC KEY TransitVaultAsymmetric; GO ALTER LOGIN TransitVaultTDELogin ADD CREDENTIAL TransitVaultTDECredentials; GO ``` 1. Finally, you can enable TDE and protect the database encryption key with the asymmetric key managed by Vault's Transit secret engine: ```sql CREATE DATABASE TestTDE GO USE TestTDE; GO CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER ASYMMETRIC KEY TransitVaultAsymmetric; GO ALTER DATABASE TestTDE SET ENCRYPTION ON; GO ``` 1. Check the status of database encryption using the following queries: ```sql SELECT * FROM sys.dm_database_encryption_keys; SELECT (SELECT name FROM sys.databases WHERE database_id = k.database_id) as name, encryption_state, key_algorithm, key_length, encryptor_type, encryption_state_desc, encryption_scan_state_desc FROM sys.dm_database_encryption_keys k; ```