Skip to content

Commit 67f4e6f

Browse files
DAILLYDAILLY
DAILLY
authored and
DAILLY
committed
updated link to assets
1 parent e17526e commit 67f4e6f

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

2.CreateGenericCMK-CEK.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -189,15 +189,15 @@ You can now check the keys in SQL Server Management Studio. The result should be
189189

190190
- CMK / CEK available
191191

192-
![CMK/CEK available](assets\ssms_keys_creation.png)
192+
![CMK/CEK available](assets/ssms_keys_creation.png)
193193

194194
- CMK Details
195195

196-
![Generic CMK](assets\ssms_cmk_details.png)
196+
![Generic CMK](assets/ssms_cmk_details.png)
197197

198198
- CEK Details
199199

200-
![Generic CMK](assets\ssms_cek_details.png)
200+
![Generic CMK](assets/ssms_cek_details.png)
201201

202202
<br />
203203
<br />
@@ -208,7 +208,7 @@ Now CMK and CEK keys are created in the database, the security administrator (wi
208208

209209
- Data before encryption :
210210

211-
![Data PlainText](assets\ssms_before_encryption.png)
211+
![Data PlainText](assets/ssms_before_encryption.png)
212212

213213
```PowerShell
214214
# set the CEK key name
@@ -238,7 +238,7 @@ Set-SqlColumnEncryption -ColumnEncryptionSettings $ces -LogFileDirectory $logdir
238238

239239
- Data after encryption :
240240

241-
![Data PlainText](assets\ssms_after_encryption.png)
241+
![Data PlainText](assets/ssms_after_encryption.png)
242242

243243
- Log file result :
244244

Issue1.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ By updating the IL Code from the original DLL, the SqlServer PowerShell module d
7373

7474
There is 2 solutions for this:
7575
- Update by yourself the IL code, and while saving the modified DLL Reflexil will prompt to "Register it for verification skipping" :<br />
76-
![](assets\reflexil_verification_skipping.png)
76+
![](assets/reflexil_verification_skipping.png)
7777

7878
- Use the already patched [System.Management.SQLServer.Management.dll](bin/Microsoft.SqlServer.Management.AlwaysEncrypted.Management.dll), and register the assembly to bypass Strong Name checking (using the sn.exe utility of the .NET SDK). The sn.exe utility is provided with the .NET Framework. Check a path like this one, depending the version of the .NET Framework installed "C:\Program Files (x86)\Microsoft SDKs\Windows\v8.1A\bin\NETFX 4.5.1 Tools".<br />
7979
Below are the following commands to:

0 commit comments

Comments
 (0)