15.12.2020»»вторник

Generation Of Encryption Key To Save To The Database Failed

15.12.2020
Generation Of Encryption Key To Save To The Database Failed Average ratng: 5,9/10 9391 reviews
-->

Aug 30, 2013 Hey Spicers, I'm trying to install WSUS services on my new Windows 2012 server but i keep getting configuration fail errors. I've copied the log below, would anybody be able to help me out? 2016-02-23 10:10:41 Generating encryption key to write to the database. 2016-02-23 10:10:41 Generation of encryption key to save to the database failed. Error=System.InvalidOperationException: Cannot save configuration because the server is still processing a previous configuration change.

Wed, 09 March 2016 SQL Server 2016: Always Encrypted. SQL Server 2016 includes a database security feature called Always Encrypted. As we've added Always Encrypted support to the SQL Server ODBC driver, our customers will be able to take advantage of this feature. Always Encrypted protects SQL Server data at the point at which it is most susceptible to attack: when that data is being used. # Generation of encryption key to save to the database failed. Error=System.Data.SqlClient.SqlException (0x80131904): Cannot open database 'SUSDB' requested by the login. The login faile. # Login failed for user ‘VIAMONSTRA Administrator’. # StartServer encountered errors. Exception=Cannot open database 'SUSDB' requested by the login.

Jan 04, 2018  2017-09-26 08:45:12 Generation of encryption key to save to the database failed. Error=System.InvalidOperationException: Cannot save configuration because the server is still processing a previous configuration change. Delete existing encryption keys and unusable encrypted content when you cannot restore the symmetric key. Recreating Encryption Keys. If you have evidence that the symmetric key is known to unauthorized users, or if your report server has been under attack and you want to reset the symmetric key as a precaution, you can recreate the symmetric key.

APPLIES TO: SQL Server 2016 and later Azure SQL Database Azure Synapse Analytics (SQL DW) Parallel Data Warehouse

An important part of report server configuration is creating a backup copy of the symmetric key used for encrypting sensitive information. A backup copy of the key is required for many routine operations, and enables you to reuse an existing report server database in a new installation.

Applies to: Reporting Services Native Mode Reporting Services SharePoint mode

Note

Reporting Services integration with SharePoint is no longer available after SQL Server 2016.

It is necessary to restore the backup copy of the encryption key when any of the following events occur:

  • Changing the Report Server Windows service account name or resetting the password. When you use the Reporting Services Configuration Manager, backing up the key is part of a service account name change operation.

    Note

    Resetting the password is not the same as changing the password. A password reset requires permission to overwrite account information on the domain controller. Password resets are performed by a system administrator when you forget or do not know a particular password. Only password resets require symmetric key restoration. Periodically changing an account password does not require you to reset the symmetric key.

  • Renaming the computer or instance that hosts the report server (a report server instance is based on a SQL Server instance name).

  • Migrating a report server installation or configuring a report server to use a different report server database.

  • Recovering a report server installation due to hardware failure.

You only need to back up one copy of the symmetric key. There is a one-to-one correspondence between a report server database and a symmetric key. Although you only need to back up one copy, you might need to restore the key multiple times if you are running multiple report servers in a scale-out deployment model. Each report server instance will need its copy of the symmetric key to lock and unlock data in the report server database.

Backing up the symmetric key is a process that writes the key to a file that you specify, and then scrambles the key using a password that you provide. The symmetric key can never be stored in an unencrypted state so you must provide a password to encrypt the key when you save it to disk. After the file is created, you must store it in a secure location and remember the password that is used to unlock the file. To backup the symmetric key, you can use the following tools: /crysis-2-cd-key-generator-download.html.

Native mode: Either the Reporting Services Configuration Manager or the rskeymgmt utility.

SharePoint mode: SharePoint Central Administration pages or PowerShell.

Backup SharePoint Mode Report Servers

For SharePoint mode report servers you can either use PowerShell commands or use the management pages for the Reporting Services service application. For more information, see the 'Key Management' section of Manage a Reporting Services SharePoint Service Application

Back up encryption keys -Reporting Services Configuration Manager (Native Mode)

  1. Start the Report Server Configuration Manager, and then connect to the report server instance you want to configure.

  2. Click Encryption Keys, and then select Back Up.

  3. Type a strong password.

  4. Specify a file to contain the stored key. Reporting Services appends a .snk file extension to the file. Consider storing the file on a disk separate from the report server.

  5. Select OK.

Back up encryption keys -rskeymgmt (Native Mode)

  1. Run rskeymgmt.exe locally on the computer that hosts the report server. You must use the -e extract argument to copy the key, provide a file name, and specify a password. The following example illustrates the arguments you must specify:

Restore Encryption Keys

Restoring the symmetric key overwrites the existing symmetric key that is stored in the report server database. Restoring an encryption key replaces an unusable key with a copy that you previously saved to disk. Restoring encryption keys results in the following actions:

  • The symmetric key is opened from the password protected backup file.

  • The symmetric key is encrypted using the public key of the Report Server Windows service.

  • The encrypted symmetric key is stored in the report server database.

  • The previously stored symmetric key data (for example, key information that was already in the report server database from a previous deployment) is deleted.

To restore the encryption key, you must have a copy of the encryption key on file. You must also know the password that unlocks the stored copy. If you have the key and the password, you can run the Reporting Services Configuration tool or rskeymgmt utility to restore the key. The symmetric key must be the same one that locks and unlocks encrypted data currently stored in the report server database. If you restore a copy that is not valid, the report server cannot access the encrypted data currently stored in the report server database. If this occurs, you might need to delete all encrypted values if you cannot restore a valid key. If for some reason you cannot restore the encryption key (for example, if you do not have a backup copy), you must delete the existing key and encrypted content. For more information, see Delete and Re-create Encryption Keys (SSRS Configuration Manager). For more information about creating symmetric keys, see Initialize a Report Server (SSRS Configuration Manager).

Restore encryption keys -Reporting Services Configuration Manager (Native Mode)

  1. Start the Reporting Services Configuration Manager, and then connect to the report server instance you want to configure.

  2. On the Encryption Keys page, select Restore.

  3. Select the .snk file that contains the back up copy.

  4. Type the password that unlocks the file.

  5. Select OK.

Restore encryption keys - rskeymgmt (Native Mode)

  1. Run rskeymgmt.exe locally on the computer that hosts the report server. Use the -a argument to restore the keys. You must provide a fully-qualified file name and specify a password. The following example illustrates the arguments you must specify:

See Also

-->

Reporting Services uses encryption keys to secure credentials and connection information that is stored in a report server database. In Reporting Services, encryption is supported through a combination of public, private, and symmetric keys that are used to protect sensitive data. The symmetric key is created during report server initialization when you install or configure the report server, and it is used by the report server to encrypt sensitive data that is stored in the report server. Public and private keys are created by the operating system, and they are used to protect the symmetric key. A public and private key pair is created for each report server instance that stores sensitive data in a report server database.

Managing the encryption keys consists of creating a backup copy of the symmetric key, and knowing when and how to restore, delete, or change the keys. If you migrate a report server installation or configure a scale-out deployment, you must have a backup copy of the symmetric key so that you can apply it to the new installation.

Generation Of Encryption Key To Save To The Database Failed To File

Important

Periodically changing the Reporting Services encryption key is a security best practice. A recommended time to change the key is immediately following a major version upgrade of Reporting Services. Changing the key after an upgrade minimizes additional service interruption caused by changing the Reporting Services encryption key outside of the upgrade cycle.

To manage symmetric keys, you can use the Reporting Services Configuration tool or the rskeymgmt utility. The tools included in Reporting Services are used to manage the symmetric key only (the public and private keys are managed by the operating system). Both the Reporting Services Configuration tool and the rskeymgmt utility support the following tasks:

  • Back up a copy of the symmetric key so that you can use it to recover a report server installation or as part of a planned migration.

  • Restore a previously saved symmetric key to a report server database, allowing a new report server instance to access existing data that it did not originally encrypt.

  • Cc cleaner for mac download. Delete the encrypted data in a report server database in the unlikely event that you can no longer access encrypted data.

  • Re-create symmetric keys and re-encrypt data in the unlikely event that the symmetric key is compromised. As a security best practice, you should recreate the symmetric key periodically (for example, every few months) to protect the report server database from cyber attacks that attempt to decipher the key.

  • Add or remove a report server instance from a report server scale-out deployment where multiple report servers share both a single report server database and the symmetric key that provides reversible encryption for that database.

In This Section

Initialize a Report Server (SSRS Configuration Manager)
Explains how encryption keys are created.

Back Up and Restore Reporting Services Encryption Keys
Explains how to back up encryption keys and restore them to recover or migrate a report server installation.

Store Encrypted Report Server Data (SSRS Configuration Manager)
Describes encryption on a report server.

Delete and Re-create Encryption Keys (SSRS Configuration Manager)
Explains how you can replace a symmetric key with a new version, and how to start over if symmetric keys cannot be validated.

Generation Of Encryption Key To Save To The Database Failed Pdf

Add and Remove Encryption Keys for Scale-Out Deployment (SSRS Configuration Manager)
Explains how to add and remove encryption keys to control which report servers are part of a scale-out deployment.

Generation Of Encryption Key To Save To The Database Failed To Start

See Also