Develop applications using Always Encrypted with secure enclaves
Applies to: SQL Server 2019 (15.x)
Azure SQL Database
Always Encrypted with secure enclaves extends Always Encrypted to enable richer functionality of application queries on encrypted sensitive database columns. It leverages secure enclave technologies to allow the query executor in Database Engine to delegate computations on encrypted columns to a secure enclave inside the Database Engine process.
Prerequisites
Your SQL Server instance or your database and server in Azure SQL Database must be correctly configured to support enclaves and attestation. For more information, see Set up the secure enclave and attestation.
You need to obtain an attestation URL for your environment from your attestation service administrator.
- If you're using SQL Server and Host Guardian Service (HGS), see Determine and share the HGS attestation URL.
- If you're using Azure SQL Database and Microsoft Azure Attestation, see Determine the attestation URL for your attestation policy.
Your application must use a SQL client driver version that supports secure enclaves. See the below sections for more details.
You need to configure an attestation protocol and an attestation URL for a database connection. The details for how you configure the attestation protocol and the attestation URL depend on the client driver, you are using.
Client drivers for Always Encrypted with secure enclaves
To develop applications using Always Encrypted with secure enclaves, you need a SQL client driver version that supports secure enclaves. The client driver plays the following key role:
- Before submitting a query that uses a secure enclave to SQL Server for execution, the driver initiates enclave attestation to verify the secure enclave is trustworthy and can be safely used to process sensitive data. For more information about attestation, see Secure Enclave Attestation.
- Once attestation succeeds, the client driver establishes a secure session with the enclave by negotiating a shared secret.
- The driver uses the shared secret to encrypt the column encryption keys the enclave will need to process the query, and sends the keys to SQL Server, which forwards them to the secure enclave that decrypts the keys.
- Finally, the driver submits the query for execution, which triggers computations inside the secure enclave.
Next steps
The following client drivers support Always Encrypted with secure enclaves:
- Microsoft .NET Data Provider for SQL Server in .NET Framework 4.6 or higher and .NET Core 2.1 or higher.
- For more information, see Using Always Encrypted with the Microsoft .NET Data Provider for SQL Server.
- For a step-by-step tutorial, see Tutorial: Develop a .NET application using Always Encrypted with secure enclaves.
- Also, see Example demonstrating use of Azure Key Vault provider and Always Encrypted with secure enclaves.
- Microsoft ODBC Driver for SQL Server, version 17.4 or higher.
- For more information, see Using Always Encrypted with the ODBC Driver.
- For information on how to enable enclave computations for a database connection using ODBC, see the Enabling Always Encrypted with Secure Enclaves section.
- Microsoft JDBC Driver for SQL Server, version 8.2 or higher.
- For more information, see Using Always Encrypted with secure enclaves with the JDBC driver
- .NET Framework Data Provider for SQL Server in .NET Framework 4.7.2 or higher.
- For more information, see Using Always Encrypted with the .NET Framework Data Provider for SQL Server.
- For a step-by-step tutorial, see Tutorial: Develop a .NET Framework application using Always Encrypted with secure enclaves