drop encryption key

Allows key owners to drop the named encryption key, including database encryption keys used for fully encrypted databases.

Syntax

drop encryption key [[database.][owner].]keyname
The syntax for explicitly dropping an external login password service key is:
drop encryption key syb_extpasswdkey
	with password encryption downgrade
The syntax for explicitly dropping a hidden text service key is:
drop encryption key syb_syscommkey_dddddd
Or:
drop encryption key syb_syscommkey with text encryption downgrade

Parameters

Examples

Usage

  • If the key has key copies, the copies are dropped along with the base key.

  • The command fails if:

    • Any column in any database is encrypted using the key.
    • The database encryption key you are dropping is still used to encrypt any database.
  • drop encryption key cannot check databases that are archived, suspect, offline, unrecovered, or currently being loaded for columns encrypted by the key. The command issues a warning message naming the unavailable database, but does not fail. When the database is brought online, any tables with columns that were encrypted with the dropped key are not usable. To restore the key, the system administrator must load a dump of the dropped key’s database from a time that precedes when the key was dropped.

See also sp_encryption and sp_help in Reference Manual: Procedures.

Standards

ANSI SQL – Compliance level: Transact-SQL extension.

Permissions

The permission checks for drop encryption key differ based on your granular permissions settings.

SettingDescription
Enabled

With granular permissions enabled, you must be the key owner or a user with manage any encryption key privilege.

For fully encrypted databases, SAP ASE creates a new permission called "manage database encryption key." You must have this permission to create a database encryption key.

Disabled

With granular permissions disabled, you must be the key owner or a user with sso_role.

For fully encrypted databases, you must be a user with sso_role, keycustodian_role, or have create encryption key privilege.

Auditing

Values in event and extrainfo columns of sysaudits are:

InformationValues
Event

109

Audit option

Command or access audited

drop encryption key

Information in extrainfo
  • Roles – current active roles

  • Keywords or options – NULL

  • Previous value – NULL

  • Current value – NULL

  • Other information – NULL

  • Proxy information – original login name, if set proxy is in effect

Related reference
create encryption key
alter encryption key