Users, Roles, and Data Access

User-specified passwords on encryption keys ensure that data privacy is protected from the system administrator.

Role

Can Create Encryption Key?

Can Use Key in a Schema Definition?

Can Decrypt Encrypted Data?

sso_role

Yes

No, requires create table permission

No. User with role may have knowledge of password, but requires select permission on table (SSO has implicit decrypt permission).

sa_role

No, requires create encryption key permission

Yes, but must be granted select permission on the key

No, requires knowledge of password

keycustodian_role

Yes

No, requires create table permission

No. User with role may have knowledge of password, but requires decrypt and select permission.

database owner or schema owner

No, requires create encryption key permission

Yes, but must be granted select permission on the key

No, requires knowledge of password.

User

No

No

Yes, but must be granted decrypt or select permission and have knowledge of key’s password.