On Demand Linked Server Creation with a SQL Server Login

By:   |   Updated: 2009-10-14   |   Comments (3)   |   Related: 1 | 2 | 3 | 4 | > Linked Servers


Problem

I am trying to create a stored procedure which creates a linked server connection, performs a query against the linked server, and then tears down that connection. I don't want the connection to be up at all times, hence the reason I want to create the connection in the stored procedure. Based on a previous tip, I know how to create the linked server within the stored procedure, but I need to make a connection via a SQL Server login. However, I don't want to store the credentials in the stored procedure as I'll have to change the stored procedure every time the password changes. How can I store the credentials securely, but in a way which makes them easier to change?

Solution

If you are using SQL Server 2005 or above, you can use SQL Server's built-in encryption to store the credentials in encrypted form and then decrypt them for use to establish the linked server connection. First, we'll need to make sure we have the proper keys in place. We're following the basic pattern of:

  1. Create a database master key for encryption.
  2. Create a certificate which is encrypted by the database master key.
  3. Create a symmetric key which is encrypted by the certificate.

We do that through the following code:

USE MSSQLTips; 
GO  

CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'P4ssw0rd!'; 
GO 

CREATE CERTIFICATE EncryptPasswordCertificate 
WITH SUBJECT = 'Asymmetric Encryption for Password via Certificate'; 
GO 

CREATE SYMMETRIC KEY EncryptPasswordSymmKey 
WITH ALGORITHM = AES_256 
ENCRYPTION BY CERTIFICATE EncryptPasswordCertificate; 
GO

Now we'll need a table to store the credentials:

CREATE TABLE ForLinkedServer (Username VARBINARY(128), UserPWD VARBINARY(128)); 
GO

And we'll need the stored procedures to set the credentials and retrieve the credentials.

CREATE PROC dbo.usp_UpdateLinkedServerCredentials 
  @Username NVARCHAR(256), 
  @UserPWD NVARCHAR(256) 
AS 
BEGIN 
  SET NOCOUNT ON; 
   
  OPEN SYMMETRIC KEY EncryptPasswordSymmKey  
  DECRYPTION BY CERTIFICATE EncryptPasswordCertificate; 

  DELETE FROM dbo.ForLinkedServer; 

  INSERT INTO dbo.ForLinkedServer (Username, UserPWD) 
  VALUES (ENCRYPTBYKEY(KEY_GUID('EncryptPasswordSymmKey'), @Username), ENCRYPTBYKEY(KEY_GUID('EncryptPasswordSymmKey'), @UserPWD)); 

  CLOSE SYMMETRIC KEY EncryptPasswordSymmKey; 
END; 
GO 

CREATE PROC dbo.usp_GetLinkedServerCredentials 
  @Username NVARCHAR(256) OUTPUT, 
  @UserPWD NVARCHAR(256) OUTPUT 
AS 
BEGIN 
  SELECT  
    @Username = CONVERT(NVARCHAR, DECRYPTBYKEYAUTOCERT(CERT_ID('EncryptPasswordCertificate'),NULL, UserName)), 
    @UserPWD = CONVERT(NVARCHAR, DECRYPTBYKEYAUTOCERT(CERT_ID('EncryptPasswordCertificate'),NULL, UserPWD))  
  FROM dbo.ForLinkedServer; 
END; 
GO 

Inserting the credentials and then verifying they were set properly:

EXEC dbo.usp_UpdateLinkedServerCredentials @Username = 'LinkedServer', 
@UserPWD = 'P4ssw0rd!'; 
GO 

DECLARE @Username NVARCHAR(256); 
DECLARE @UserPWD NVARCHAR(256); 

EXEC dbo.usp_GetLinkedServerCredentials @Username OUTPUT, @UserPWD OUTPUT; 

SELECT @Username [User], @UserPWD [Password]; 
GO

Once we do that, we'll need to "prime the pump" with respect to the linked server connection, just as we did in that previous tip:

EXEC sys.sp_addlinkedserver @server = 'LinkingServer', 
@srvproduct = N'SQL Server';
GO

Once that is done, we can create the stored procedure. Note that I've added code to retrieve the credentials and then use sp_addlinkedsrvlogin to create the credential. In this case I'm associating this remote login with only the sa login locally. This will be something that will allow us to test and verify everything is working. One other point I'll make is that I've now wrapped the query against the remote server into a statement being called by sp_executesql. For whatever reason, when we create the linked server connection credentials, they will not be used in the existing batch. We can cheat by forcing a separate batch after the credentials are stored in order to accomplish the same result.

CREATE PROC dbo.usp_GetDatabasesFromRemoteServer 
AS  
BEGIN  

  IF NOT EXISTS(SELECT name FROM sys.servers WHERE name = 'LinkingServer')  
    BEGIN 
      EXEC sys.sp_addlinkedserver @server = 'LinkingServer', 
           @srvproduct = N'SQL Server';  
    END 
     
    DECLARE @Username NVARCHAR(256); 
    DECLARE @UserPWD NVARCHAR(256); 
       
    EXEC dbo.usp_GetLinkedServerCredentials @Username OUTPUT, @UserPWD OUTPUT; 
     
    EXEC sys.sp_addlinkedsrvlogin @rmtsrvname = 'LinkingServer', @useself = 'FALSE', 
         @locallogin = 'sa', @rmtuser = @Username, @rmtpassword = @UserPWD; 
     
  EXEC sp_executesql N'SELECT [name] AS [Database] 
       FROM [LinkingServer].master.sys.databases;' 
    
  EXEC sys.sp_dropserver @server = 'LinkingServer', @droplogins = 'droplogins';  
END;  
GO

Now with the new stored procedure in place, we can execute as the sa login to verify that the credentials are working as expected:

EXECUTE AS LOGIN = 'sa'; 
GO 

EXEC dbo.usp_GetDatabasesFromRemoteServer; 
GO 

REVERT; 
GO 

And with the result set present, we know we successfully connected to the linked server.

list of databases

If you don't wrap the query to the linked server using a dynamic SQL technique like through the use of sp_executesql, the fact that we've just told SQL Server to map the sa account to a different set of credentials won't register. SQL Server will attempt to use the same credentials across the linked server connection. In my case, the sa login is disabled on the second server, so the query will fail. We can see this if we strip out the sp_executesql statement using a second stored procedure (you will need to prime the pump again with the linked server connection creation, as with the previous stored procedure):

CREATE PROC dbo.usp_GetDatabasesFromRemoteServerNoDynamicSQL 
AS  
BEGIN  

  IF NOT EXISTS(SELECT name FROM sys.servers WHERE name = 'LinkingServer')  
    BEGIN 
      EXEC sys.sp_addlinkedserver @server = 'LinkingServer', @srvproduct = N'SQL Server';  
    END 
     
    DECLARE @Username NVARCHAR(256); 
    DECLARE @UserPWD NVARCHAR(256); 
       
    EXEC dbo.usp_GetLinkedServerCredentials @Username OUTPUT, @UserPWD OUTPUT; 
     
    EXEC sys.sp_addlinkedsrvlogin @rmtsrvname = 'LinkingServer', @useself = 'FALSE', 
         @locallogin = 'sa', @rmtuser = @Username, @rmtpassword = @UserPWD; 
     
  SELECT [name] AS [Database] FROM [LinkingServer].master.sys.databases; 
    
  EXEC sys.sp_dropserver @server = 'LinkingServer', @droplogins = 'droplogins';  
END;  
GO

And let us execute that second stored procedure:

EXECUTE AS LOGIN = 'sa'; 
GO 

EXEC dbo.usp_GetDatabasesFromRemoteServerNoDynamicSQL; 
GO 

REVERT; 
GO 

And instead of a result set we get back an error indicating the sa login was attempted across the linked server connection. As a result, the linked server query failed:

login failed

So if you have to use a linked server connection with SQL Server-based authentication, make sure to wrap the query going to the linked server using sp_executesql.

Next Steps


sql server categories

sql server webinars

subscribe to mssqltips

sql server tutorials

sql server white papers

next tip



About the author
MSSQLTips author K. Brian Kelley K. Brian Kelley is a SQL Server author and columnist focusing primarily on SQL Server security.

This author pledges the content of this article is based on professional experience and not AI generated.

View all my tips


Article Last Updated: 2009-10-14

Comments For This Article




Friday, October 16, 2009 - 7:54:04 AM - admin Back To Top (4207)

Brian,

I think the use cases for this tip could be significant.  I also think this could help to secure many SQL Servers.  I know many customers have linked servers across many servers and do not even realize it.  They also do not realize what someone can do with them, either intentionally or mistakenly.

I think another tip you should consider writing is related to linked server best practices.  I think linked servers offer a great deal of value, but they are not always the best solution to access data.  I am also a little concerned when I see linked servers between Dev\QA and production environments.  Not sure if you share those sediments or not.

Thank you,
The MSSQLTips Team


Wednesday, October 14, 2009 - 1:33:46 PM - K. Brian Kelley Back To Top (4192)

Check out SQL Server MVP John Magnabosco's new eBook (it's free):

Protecting SQL Server Data

It'll walk you through the basics.


Wednesday, October 14, 2009 - 11:54:35 AM - SankarReddy Back To Top (4191)

Brian,

Thanks for covering this complex topic. I had to read few times to understand what's happening here. I think its time for me to learn about the certificates and encryption. Good article and nicely done.

 















get free sql tips
agree to terms