Sitemap

Encrypt Your Database

By default the Pleasant Password Server built-in SQLite database is encrypted. For an alternate database, be sure to follow the steps or links below to configure the encryption for your alternate database (i.e. PostgreSQL, SQL Server, Azure).

Below are encryption alternatives you may consider.

SQLite

  • Encrypted by default.

MSSQL

  • TDE Encryption: 

    • Fully Supported. Below are steps to apply and revert transparent encryption to the whole database.
    • TDE Encryption Setup Steps    (Versions: 2008-2014 All Editions, and, 2016 Enterprise only)
  • Always-On Encryption:

    • Not Supported. This encryption model would not facilitate convenient handling of application searches and so has not been included.
  • 3rd-Party Solutions:

PostgreSQL

Options are listed here:

Azure SQL

Paid subscription model, includes TDE encryption by default.

Third-Party Encryption Solutions

Please Note:

  • Pleasant Solutions has provided this information as a convenience to you, but does does not officially recommend Third-Party provider solutions. Pleasant Solutions has not audited and does not control or manage these products and cannot confirm the quality or safety of using these listed.

Database Patches

The following companies offer TDE (transparent database encryption) solutions.

 

System Volumes

The following companies offer disk/volume encryption:

  • BitLocker (by Microsoft): included in some windows versions

  • BestCrypt (by Jetico)

 

Cloud Provider Encryption

Many cloud providers provide encrypted TDE databases (MS-SQL, PostgreSQL). Example:

  • AWS
  • MS Azure
  • etc.