In the previous chapters we’ve looked at how Always Encrypted works, how to set it up, and how to work with it in practice.
Along the way we’ve seen a few restrictions, such as the need to use BIN2 collations for text-based columns or the requirement to use parameter-based queries against encrypted columns. There are a number of other limitations, but on the whole these aren’t representative of an incomplete or poorly implemented technology. Rather, they are the natural consequences of the type of ...