253 lines
7.2 KiB
Plaintext
253 lines
7.2 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: Install the Vault EKM Provider
|
|
description: Installation steps for the Vault EKM Provider for Microsoft SQL Server.
|
|
---
|
|
|
|
# Installing the Vault EKM Provider
|
|
|
|
This guide assumes you are installing the Vault EKM Provider for the first time.
|
|
For upgrade instructions, see [upgrading](/docs/platform/mssql/upgrading).
|
|
|
|
## Prerequisites
|
|
|
|
* Vault Enterprise server 1.9+ with a license for the Advanced Data Protection Key Management module
|
|
* Microsoft Windows Server operating system
|
|
* Microsoft SQL Server for Windows (SQL Server for Linux [does not support EKM][linux-ekm])
|
|
* An authenticated Vault client
|
|
|
|
To check your Vault version and license, you can run:
|
|
|
|
```bash
|
|
vault status
|
|
vault license get -format=json
|
|
```
|
|
|
|
The list of features should include "Key Management Transparent Data Encryption".
|
|
|
|
[linux-ekm]: https://docs.microsoft.com/en-us/sql/linux/sql-server-linux-editions-and-components-2019?view=sql-server-ver15#Unsupported
|
|
|
|
## Installing the Vault EKM provider
|
|
|
|
## Configuring Vault
|
|
|
|
The EKM provider requires AppRole auth and the Transit secret engine to be setup
|
|
on the Vault server. The steps below can be used to configure Vault ready for the
|
|
EKM provider to use it.
|
|
|
|
-> **Note:** rsa-2048 is currently the only supported key type.
|
|
|
|
1. Set up AppRole auth:
|
|
|
|
```bash
|
|
vault auth enable approle
|
|
vault write auth/approle/role/ekm-encryption-key-role \
|
|
token_ttl=20m \
|
|
max_token_ttl=30m \
|
|
token_policies=tde-policy
|
|
```
|
|
|
|
1. Retrieve the AppRole ID and secret ID for use later when configuring SQL Server:
|
|
|
|
```bash
|
|
vault read auth/approle/role/tde-role/role-id
|
|
vault write -f auth/approle/role/tde-role/secret-id
|
|
```
|
|
|
|
1. Enable the transit secret engine and create a key:
|
|
|
|
```bash
|
|
vault secrets enable transit
|
|
vault write -f transit/keys/ekm-encryption-key type="rsa-2048"
|
|
```
|
|
|
|
1. Create a policy for the Vault EKM provider to use. The following policy has
|
|
the minimum required permissions:
|
|
|
|
```bash
|
|
vault policy write tde-policy -<<EOF
|
|
path "transit/keys/ekm-encryption-key" {
|
|
capabilities = ["create", "read", "update", "delete"]
|
|
}
|
|
|
|
path "transit/keys" {
|
|
capabilities = ["list"]
|
|
}
|
|
|
|
path "transit/encrypt/ekm-encryption-key" {
|
|
capabilities = ["update"]
|
|
}
|
|
|
|
path "transit/decrypt/ekm-encryption-key" {
|
|
capabilities = ["update"]
|
|
}
|
|
|
|
path "sys/license/status" {
|
|
capabilities = ["read"]
|
|
}
|
|
EOF
|
|
```
|
|
|
|
## Configuring SQL Server
|
|
|
|
The remaining steps are all run on the database server.
|
|
|
|
### Install the EKM provider on the server
|
|
|
|
1. Download and run the latest Vault EKM provider installer from
|
|
[releases.hashicorp.com](https://releases.hashicorp.com/vault-mssql-ekm-provider/)
|
|
1. Enter your Vault server's address when prompted and complete the installer
|
|
1. If you need to configure non-default namespace or mount paths for your AppRole and
|
|
Transit engines, see [configuration](/docs/platform/mssql/configuration).
|
|
|
|
### Configure the EKM provider using SQL
|
|
|
|
Open Microsoft SQL Server Management Studio, and run the queries below to complete
|
|
installation.
|
|
|
|
1. Enable the EKM feature and create a cryptographic provider using the folder
|
|
you just installed the EKM provider into.
|
|
|
|
```sql
|
|
-- Enable advanced options
|
|
USE master;
|
|
GO
|
|
|
|
EXEC sp_configure 'show advanced options', 1;
|
|
GO
|
|
|
|
RECONFIGURE;
|
|
GO
|
|
|
|
-- Enable EKM provider
|
|
EXEC sp_configure 'EKM provider enabled', 1;
|
|
GO
|
|
|
|
RECONFIGURE;
|
|
GO
|
|
|
|
CREATE CRYPTOGRAPHIC PROVIDER TransitVaultProvider
|
|
FROM FILE = 'C:\Program Files\HashiCorp\Transit Vault EKM Provider\TransitVaultEKM.dll'
|
|
GO
|
|
```
|
|
|
|
1. Next, create credentials for an admin to use EKM with your AppRole role and
|
|
secret ID from above:
|
|
|
|
```sql
|
|
-- Replace <approle-role-id> and <approle-secret-id> with the values from
|
|
-- the earlier vault commands:
|
|
-- vault read auth/approle/role/tde-role/role-id
|
|
-- vault write -f auth/approle/role/tde-role/secret-id
|
|
CREATE CREDENTIAL TransitVaultCredentials
|
|
WITH IDENTITY = '<approle-role-id>',
|
|
SECRET = '<approle-secret-id>'
|
|
FOR CRYPTOGRAPHIC PROVIDER TransitVaultProvider;
|
|
GO
|
|
|
|
-- Replace <domain>\<login> with the SQL Server administrator's login
|
|
ALTER LOGIN "<domain>\<login>" ADD CREDENTIAL TransitVaultCredentials;
|
|
```
|
|
|
|
1. You can now create an asymmetric key using the transit key set up earlier:
|
|
|
|
```sql
|
|
CREATE ASYMMETRIC KEY TransitVaultAsymmetric
|
|
FROM PROVIDER TransitVaultProvider
|
|
WITH
|
|
CREATION_DISPOSITION = OPEN_EXISTING,
|
|
PROVIDER_KEY_NAME = 'ekm-encryption-key';
|
|
```
|
|
|
|
-> **Note:** This is the first step at which the EKM provider will communicate with Vault. If
|
|
Vault is misconfigured, this step is likely to fail. See
|
|
[troubleshooting](/docs/platform/mssql/troubleshooting) for tips on specific error codes.
|
|
|
|
1. Create another login from the new asymmetric key:
|
|
|
|
```sql
|
|
-- Replace <approle-role-id> and <approle-secret-id> with the values from
|
|
-- the earlier vault commands again
|
|
CREATE CREDENTIAL TransitVaultTDECredentials
|
|
WITH IDENTITY = '<approle-role-id>',
|
|
SECRET = '<approle-secret-id>'
|
|
FOR CRYPTOGRAPHIC PROVIDER TransitVaultProvider;
|
|
GO
|
|
|
|
CREATE LOGIN TransitVaultTDELogin
|
|
FROM ASYMMETRIC KEY TransitVaultAsymmetric;
|
|
GO
|
|
|
|
ALTER LOGIN TransitVaultTDELogin
|
|
ADD CREDENTIAL TransitVaultTDECredentials;
|
|
GO
|
|
```
|
|
|
|
1. Finally, you can enable TDE and protect the database encryption key with
|
|
the asymmetric key managed by Vault's Transit secret engine:
|
|
|
|
```sql
|
|
CREATE DATABASE TestTDE
|
|
GO
|
|
|
|
USE TestTDE;
|
|
GO
|
|
|
|
CREATE DATABASE ENCRYPTION KEY
|
|
WITH ALGORITHM = AES_256
|
|
ENCRYPTION BY SERVER ASYMMETRIC KEY TransitVaultAsymmetric;
|
|
GO
|
|
|
|
ALTER DATABASE TestTDE
|
|
SET ENCRYPTION ON;
|
|
GO
|
|
```
|
|
|
|
1. Check the status of database encryption using the following queries:
|
|
```sql
|
|
SELECT * FROM sys.dm_database_encryption_keys;
|
|
|
|
SELECT (SELECT name FROM sys.databases WHERE database_id = k.database_id) as name,
|
|
encryption_state, key_algorithm, key_length,
|
|
encryptor_type, encryption_state_desc, encryption_scan_state_desc FROM sys.dm_database_encryption_keys k;
|
|
|
|
```
|
|
|
|
## Key Rotation
|
|
|
|
Both the database encryption key and Vault Transit's asymmetric key can be rotated independently.
|
|
|
|
To rotate the database encryption key, you can execute the
|
|
[following SQL query](https://docs.microsoft.com/en-us/sql/t-sql/statements/alter-database-encryption-key-transact-sql?view=azuresqldb-current)
|
|
in Microsoft SQL Server Management Studio:
|
|
|
|
```sql
|
|
USE TestTDE;
|
|
GO
|
|
|
|
ALTER DATABASE ENCRYPTION KEY
|
|
REGENERATE WITH ALGORITHM = AES_256;
|
|
GO
|
|
|
|
SELECT * FROM sys.dm_database_encryption_keys;
|
|
```
|
|
|
|
To rotate the asymmetric key in Vault's Transit, you can use the standard
|
|
[`/rotate`](/api-docs/secret/transit#rotate-key) endpoint:
|
|
|
|
```shell-session
|
|
$ vault write -f transit/keys/ekm-encryption-key/rotate
|
|
```
|
|
|
|
After rotating the Vault asymmetric key, you can force SQL Server to re-encrypt the database encryption
|
|
key with the newest version of the Vault key with:
|
|
|
|
```sql
|
|
USE TestTDE;
|
|
GO
|
|
|
|
ALTER DATABASE ENCRYPTION KEY
|
|
ENCRYPTION BY SERVER ASYMMETRIC KEY TransitVaultAsymmetric;
|
|
GO
|
|
```
|