[{"id":"ci_e98a2cefc3a921f3d26fd38607f11f78c6aa1888e97519a970520730876fa010","title":"Version Information","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/version-information","children":[]},{"id":"ci_c98b8bad49fb2ba8d7246a6452792ff27f02b1bcebf7ce138b06ebc1f05d93ca","title":"Introduction","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/introduction","children":[{"id":"ci_86ed8188076a652fd87d217ce88513a5c5b6ddb5c8ebe4d402039db687891b19","title":"About This Guide","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/about-this-guide","children":[]},{"id":"ci_79e75eb27e8acbb0d468f57634ac482e85fd4c6fbc3fdc497f3ce977f83d9b77","title":"Target Audience for This Guide","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/target-audience-for-this-guide","children":[]},{"id":"ci_85d34cab7e4ba180d23fbc0b11657be7fff673eeff9a5ea989e90cf7ad5d9b48","title":"Abbreviations","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/abbreviations","children":[]},{"id":"ci_0d3044718792e6e820936a32ba470ae01c5a37aaf23716ea0737efcf615d1dc5","title":"Document Conventions","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/document-conventions","children":[]}]},{"id":"ci_cd5c7f329d26ad9e45b512b52a7cf57aa90000555045de30ee8217944cb36026","title":"Product Overview","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/product-overview","children":[{"id":"ci_309c01be7b8d58afbe8c133f9934fc64f0537cc092f0fcb1ba99071ffb9865b6","title":"Microsoft SQL Server EKM Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/microsoft-sql-server-ekm-provider","children":[]},{"id":"ci_4a4c2d60d2d7e3bc093e6089bf20d65203b27a823c8e58b1be78c6f08103a739","title":"Utimaco u.trust GP HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/utimaco-u-trust-gp-hsm","children":[]}]},{"id":"ci_8ada8210a8693e25aeee1a1c6672c086c39d06dfaab727147174fcc752d253bf","title":"Integration Requirements and Prerequisites","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/integration-requirements-and-prerequisites","children":[{"id":"ci_74a643bff835fdf750853ec9dfb407dd5abf2bbb13ed7954b6c4397b8950d4e2","title":"Tested Versions","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/tested-versions","children":[]},{"id":"ci_af6b22258e71876db935850a962ad9beced0ce83c49830c3dc0d0d7ff894c56c","title":"Hardware and Software Requirements","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/hardware-and-software-requirements","children":[]},{"id":"ci_c6d962ca599c6dde6c3c2c0827eaeefddb28bbd46f60f9eb93596dd1a9159eab","title":"Prerequisites","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/prerequisites","children":[]}]},{"id":"ci_09fec10b777d1f3c2d43740b4abc3d42897ef7a7820c69004673478d88651bff","title":"Installation and Configuration","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/installation-and-configuration","children":[{"id":"ci_1aa6a377c222545878c8511b779145f0d843ed4fb1aae749af431f08547711a8","title":"Setting Up u.trust Anchor HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/setting-up-u-trust-anchor-hsm","children":[]},{"id":"ci_4c94e49dd4456a4e7cbafedd2c8c64061f225927321a44a91f5f45fe491913e3","title":"Setting Up Microsoft SQL Server","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/setting-up-microsoft-sql-server","children":[]}]},{"id":"ci_680a15d4649fe97e18d4365d48e921cda28e0f280d28a76b6b2b4521e2e5c63a","title":"Integration Steps","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/integration-steps","children":[{"id":"ci_86ee3badd1b81b4366b6a1d8e08e9859d59e8121d1f73f9bce21d251329fea43","title":"Configuration on u.trust Anchor","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/configuration-on-u-trust-anchor","children":[{"id":"ci_e4b26a50083d2ca5cd9352fb16255b157ef3694fc26ab361eb9c4a9d590652a1","title":"Location of the Configuration File","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/location-of-the-configuration-file","children":[]},{"id":"ci_06108acff68d3bc1267e60c6cfa28633107ad2b8c8d1b6a4fc433120830bdd3e","title":"Customization of the Configuration File","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/customization-of-the-configuration-file","children":[]},{"id":"ci_4a43dd7fad7c3d2ce921449f3e4e6d054dac9674d0fef7217d1fe73cf9f2277f","title":"Configuration of the External Keystore","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/configuration-of-the-external-keystore","children":[]}]},{"id":"ci_299d7ee29910743647ec3653c0c3c6b64db590c3883cfcab55c2a0147033b880","title":"Configuration on Microsoft SQL Server","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/configuration-on-microsoft-sql-server","children":[{"id":"ci_ed1ce759a1cf95982d1aae2f05a43c311db3b9efb3078578fd055d0c4b8e8788","title":"Enable Extensible Key Management","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/enable-extensible-key-management","children":[]},{"id":"ci_c5b5390b0bfbd15ceaa04afaa5e556b8ba3d7f2d4ca33616da7fffbe9cb5ae04","title":"Register Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/register-provider","children":[{"id":"ci_185fce3228aaffb70b7cfb54925a63bb1449054082517a81f5ad1baa53d9aabc","title":"Alter Provider Location","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/alter-provider-location","children":[]},{"id":"ci_b7e41e46cc5d0d3a3786a3bf9a1ec0266f0a3bfd69788e43a7dff03e6b60053d","title":"Remove Provider","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/remove-provider","children":[]}]}]},{"id":"ci_efeb14be1967c7affba193759315a2b3b2d28b211414f67e75821b5330ef1d60","title":"Key/Token Management","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/key-token-management","children":[{"id":"ci_48a434c0238e067b9756ae9ee9c8873716dfb694822b8c25ce210f53f2b7f72c","title":"Improving Security via CXI Group","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/improving-security-via-cxi-group","children":[]},{"id":"ci_f36ad1fc9490a0cda1c91f3148dcfb172897c333f1bae279d9eef9f9dad71106","title":"Cryptographic User Hierarchy","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/cryptographic-user-hierarchy","children":[]}]}]},{"id":"ci_8f47954b11f95d33e7e69e2ced4188080bb6f5a0ef4011ecb1a8a389f8decee4","title":"Verification and Testing","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/verification-and-testing","children":[{"id":"ci_399b30e754b4f605ca8822cfcb455c44e9e9da513b03bed616a720cb0f4681a9","title":"Functional Testing","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/functional-testing","children":[{"id":"ci_6ba89840c08af32741a882fd0b89545b16dce759ac8d8474d9e9dcf45fc30d62","title":"Key Management","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/key-management","children":[{"id":"ci_8567279ba01bbe9e7a4bc7e44d635d3e1f3650786e22d8e26d126920de75c824","title":"Creating Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/creating-keys","children":[]},{"id":"ci_aeaebe28b28f5779638f987a636757b759654d768a7e4f30753234aa92b80eb2","title":"Viewing Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/viewing-keys","children":[]},{"id":"ci_4bfdf0b6778ccc16f14632e0b8ef54201726d12dd5527216574e52eb57291429","title":"Deleting Keys","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/deleting-keys","children":[]}]},{"id":"ci_299b811a9fe41a5424bb91ddd857b31f907010dea5237965ef6bc86f3815a1bf","title":"Column Level Encryption","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/column-level-encryption","children":[]},{"id":"ci_f4641fc27434252270dc49519c41250fd067d3b625df4f0aba37a655d6071c2c","title":"Transparent Data Encryption","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/transparent-data-encryption","children":[]},{"id":"ci_68952cf94f708a1bd7382357bf5536f96e67edcf23052fb5cdfa04c637c30896","title":"Microsoft SQL Server Clustering","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/microsoft-sql-server-clustering","children":[{"id":"ci_9e6e5ee18681f059592f61a73dfb3eb2cd56f8f329806226f5acfb8731c5b56a","title":"Installing Failover Clustering Feature on the Cluster Nodes","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/installing-failover-clustering-feature-on-the-clus","children":[]},{"id":"ci_b0bd72a28ced3cb8d580cd6e673330145e65f773fe3221aec697f18562155346","title":"Install and Configure MS SQL on a Failover Cluster","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/install-and-configure-ms-sql-on-a-failover-cluster","children":[{"id":"ci_f61cc9a925b4f1176a303e5785b61bddb324a0bf9568f6e59206ba8df567477a","title":"Installation of SQL Server on Cluster Nodes","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/installation-of-sql-server-on-cluster-nodes","children":[]}]},{"id":"ci_700bc995d3e0a6cde2eff7fb981a629b66cf3c37a654caf9a0545a957939a935","title":"Verify Failover Cluster Configuration","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/verify-failover-cluster-configuration","children":[]},{"id":"ci_4bc0e6704442cf1d5d9c3a722822224d3eacc28c3ecfe962bb0dbb7e2919cbda","title":"SQL Server Clustering with Utimaco HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/sql-server-clustering-with-utimaco-hsm","children":[]}]},{"id":"ci_a3608b940e939fa542b1115df8e5cc8d31771882d0d5d2cf51cd1d308a2d0b1c","title":"Database Mirroring","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/database-mirroring","children":[{"id":"ci_97997bd0f94d54752b724ab503f5a283aef972d1f3c8212e6a8c8b6155569899","title":"SQL Server Setup","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/sql-server-setup","children":[]},{"id":"ci_e60f0a813e8150f634ea37741c590d86b44e132e96cc139c93978944dcb3c8a9","title":"Configure Database Mirroring","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/configure-database-mirroring","children":[]},{"id":"ci_b07938a56c501e57560e1c663891984dbd0b47484153c61f54d30d88b0229d2a","title":"Database Mirroring with Utimaco HSM","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/database-mirroring-with-utimaco-hsm","children":[{"id":"ci_997b0ca4b31b770ed1ec9ec056562cb3ef0d4ad86039522db7adccbcf68c7186","title":"To Test Failover Scenario","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/to-test-failover-scenario","children":[]}]}]}]}]},{"id":"ci_45eb98c918bbe13cf6eee297e2e822c3688214e964a3a36587a7ae1104bc330c","title":"Troubleshooting","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/troubleshooting","children":[{"id":"ci_8b5b204f52cc0f113d2e427d50ef46ce80d4ffba3eda35c061988a0e9cfdc6e9","title":"Common Issues and How to Resolve Them","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/common-issues-and-how-to-resolve-them","children":[]},{"id":"ci_7a1b5e0e668954d11eea58efeef971f1fde763905ad84d9a8e0a3094e3d43018","title":"Log Locations and Interpretation","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/log-locations-and-interpretation","children":[]}]},{"id":"ci_ac5518009204bd086bdc07d6058a85736951e0b0c666db5d2bd471ccb5aac3a2","title":"Appendices","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/appendices","children":[{"id":"ci_4d3984761c8fb192c46ac9b1ac22a1b43915a69554904b61c58a93cf0093edd0","title":"References","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/references","children":[]},{"id":"ci_c8a5ffb675d585b21b78cbadfe97920e21ed68cbf1d4891a3cf7413b2a4c60fb","title":"Command Summary","path":"/microsoft-sql-server-ekm-provider-and-securityserver/1.0.0/command-summary","children":[]}]}]