[{"id":"ci_daae13366f26c3c61c7c26c8f2d73641fc8598ce8396cd150f0f5578a2aac602","title":"Version Information and PDF Download","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/version-information","children":[]},{"id":"ci_d750ee19e53172f4692e2f6527c2a581ea77208536f705b2ef26c81d230a519f","title":"Introduction","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/introduction","children":[{"id":"ci_1861956d28f024ba539ce6e8642a202ab476aa7745713a5a35864474aebfbdf8","title":"About This Guide","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/about-this-guide","children":[]},{"id":"ci_924a393626cd00c0f072e022fb232ae3e4e2200fdb0101a38da208505e5983f8","title":"Target Audience for This Guide","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/target-audience-for-this-guide","children":[]},{"id":"ci_853e0f0b180771abd11840ca47eb718ee54ea5def48f28889f93fe60b117a235","title":"Document Conventions","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/document-conventions","children":[]},{"id":"ci_71e3bcbee45c3e8f9e421091727b5cfcaa8e264429cd03a1694257647f1c5e61","title":"Abbreviations","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/abbreviations","children":[]}]},{"id":"ci_d8f9661c4e09a032aa53ca2ee8cb264528ab3b902f5024120fca3a5d5611058f","title":"Overview","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/product-overview","children":[{"id":"ci_580d65ef51966072a9abf9c82a1aa38273e67f6669612215a7660aec8d17b116","title":"Microsoft SQL Server EKM Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/microsoft-sql-server-ekm-provider","children":[]},{"id":"ci_78b9bd9066daf3b5b4c22a804b5c5b8613b564a3ab5b0ecbd352f3eccfa47a34","title":"Utimaco u.trust GP HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/utimaco-u-trust-gp-hsm","children":[]}]},{"id":"ci_194e8017d05257246346694a00a2a977b702593c6e581880e2ed1f561fe296f3","title":"Integration Requirements and Prerequisites","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/integration-requirements-and-prerequisites","children":[{"id":"ci_f1dcc5a7e0e70e921a52a294e5a73d857a4750ab301aae10ae279e81d74ce1e1","title":"Tested Versions","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/tested-versions","children":[]},{"id":"ci_2238c65bbe2a1f02fe5a9269652aad33a25dc5124db4977ef99bc9cecc927978","title":"Hardware and Software Requirements","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/hardware-and-software-requirements","children":[]},{"id":"ci_2bc5d3b8e9dad8ba91e59be90696121367b79972ad12318bd49782a6325fde0a","title":"Prerequisites","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/prerequisites","children":[]}]},{"id":"ci_9e20f1cbef418cb87516abc16ee2c04dfd452268772cea5e7effdc104a4d37ec","title":"Software Download and Installation","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/installation-and-configuration","children":[{"id":"ci_510ddaddce4419e57abb24a99f8b386570e337415e2023f69d76022381734392","title":"Download Utimaco Software","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/setting-up-u-trust-anchor-hsm","children":[]},{"id":"ci_3aead8ea0f53c3b880631cd1c2cb22310bbea5ae1b19a7bc3107952639bc8b4b","title":"Configuration File","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/setting-up-microsoft-sql-server","children":[{"id":"ci_eb4bb9307b62c38637366ae75a30a1ab3db0cad236f86d262a5c9dbe3fc1ce25","title":"Location of the Configuration File","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/location-of-the-configuration-file","children":[]},{"id":"ci_93d20b569691154b72f59c3070f90403c75b81c06c31af3b319a52e6d54293e0","title":"Customization of the Configuration File","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/customization-of-the-configuration-file","children":[]}]},{"id":"ci_30540a76078347b8b6d5c5b1acdf85cf26bc3f4246d83c06f6e012451fc98767","title":"Enable Extensible Key Management","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/enable-extensible-key-management","children":[]},{"id":"ci_89f0102c1121f780e4e9d7ce81e7f3139ab2c5c14c6880ccd9bcc665786a446f","title":"Register Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/register-provider","children":[{"id":"ci_8e6dbedee8d9f39420063e7dbd19ac426da0d313703fc4888ca957dd8382a408","title":"Alter Provider Location","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/alter-provider-location","children":[]},{"id":"ci_301b2dbbb5ead06f06609035dd329ba0f318352f8bfa8a4a5a2c7977cbd7d6ed","title":"Remove Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/remove-provider","children":[]}]},{"id":"ci_f1cdd2a0c54eff8180fb9ea4f26a7d7e6e4bad0940fd4041ebdc641ae7443310","title":"Setting Up Credentials","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/setting-up-credentials","children":[{"id":"ci_b9676b85fe783aa2d99faea40ceb2e012e5f8a3528060d553534889c87cf54c0","title":"Improving Security via CXI Group","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/improving-security-via-cxi-group","children":[]},{"id":"ci_c8de0b5db108e90ac769ef15b56900a0c2a3b477c689ad4482824e5c16b87490","title":"Cryptographic User Hierarchy","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/cryptographic-user-hierarchy","children":[]}]}]},{"id":"ci_50596e29fa7fb5e69d03d13534d094d960dd9990b85b1504be6f2ce113e07b96","title":"Using the Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/using-the-provider","children":[{"id":"ci_acc00aa397dbe7d7fb69f5509eceb4fc14667559b288fa6b0c193ac8f2e2273e","title":"Creating Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/creating-keys","children":[]},{"id":"ci_ea2e1bee0a2e21d415e70f759e03d611d317b5355b949e5b615a06ae2a9ac634","title":"Viewing Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/viewing-keys","children":[]},{"id":"ci_0ae6d127c6564c27ecaefb96a7d18c47b7510cb13cda8d7f14bdac441a6645ac","title":"Deleting Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/deleting-keys","children":[]}]},{"id":"ci_f08f641864996fafa83573813b05bafda9f24a3a5b76579c2a2dd0195096c1d7","title":"Column Level Encryption","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/column-level-encryption","children":[]},{"id":"ci_c5b11f88f72d263b68acc9c26902abb09c226425f8480429c123753f7bacbd1e","title":"Transparent Data Encryption","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/transparent-data-encryption","children":[]},{"id":"ci_a2d1790af80093cb7bdaa6e3342147d0252ef80fd66f30f6531ffdd769eb6264","title":"Microsoft SQL Server Clustering","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/microsoft-sql-server-clustering","children":[{"id":"ci_c68847e8383d422362c64ecca6db546abb1afcfc4a14b4bd685cba16cbc72d86","title":"Installing Failover Clustering feature on the Cluster Nodes","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/installing-failover-clustering-feature-on-the-clus","children":[]},{"id":"ci_47bab7832ed19338bad6bbf866d59850b0b9e4a2f1b58a160ed6a7614fb49c95","title":"Install and Configure MS SQL on a Failover Cluster","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/install-and-configure-ms-sql-on-a-failover-cluster","children":[{"id":"ci_68bf34c5257f0385f7a6fe73664f7a3b1b07da1c7e5b952940ce947fa39a7d4e","title":"Installation of SQL Server on Cluster Nodes","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/installation-of-sql-server-on-cluster-nodes","children":[]}]},{"id":"ci_4905ffd4fdc590da6a1f29d0d11a9c79941715cd3710081bb74e754bae4d54d7","title":"Verify Failover Cluster Configuration","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/verify-failover-cluster-configuration","children":[]},{"id":"ci_7aff4a91f63a1f7b8fb9a57ce8d6708de13ea51e4b1e59b5ab032168a41ef2ec","title":"SQL Server Clustering with Utimaco HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/sql-server-clustering-with-utimaco-hsm","children":[]}]},{"id":"ci_93fabb6aee521b7d5adce1b3e2c027aec8617441220040263fed5565f198bb33","title":"Database Mirroring","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/database-mirroring","children":[{"id":"ci_bc042623154bd0263754afd9d5115185c0b36445458e8701f6bcfb09d6f11eb4","title":"SQL Server Setup","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/sql-server-setup","children":[]},{"id":"ci_efe4f62725085285e269998d8471afd3c71826287fbb9d334ef72fa28c576ca7","title":"Configure Database Mirroring","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/configure-database-mirroring","children":[]},{"id":"ci_fce213be984d4169d038c89fde9df2e9985984fec54fd137241cd1a0c06b6ad3","title":"Database Mirroring with Utimaco HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/database-mirroring-with-utimaco-hsm","children":[{"id":"ci_9761ca1899d0dd44397305ed450f103c8f1a0c53165f0adef30b62f0f1ff8279","title":"To Test Failover Scenario","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/to-test-failover-scenario","children":[]}]}]},{"id":"ci_1e245865e28259b6845dc9fa5d9ef5f847efca27c150374933becea304c77067","title":"Troubleshooting","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/troubleshooting","children":[]},{"id":"ci_6ea003950ab2923d5dcf4ed209ea35b25deacfaa614949bf0c605dbf999fdfff","title":"Further Information","path":"/microsoft-sql-server-ekm-provider-and-securityserver/0.1.0/further-information","children":[]}]