This is the last chapter on the basic version of Always Encrypted before we move on to look at the version with enclaves. I want to wrap up by looking at some additional items you may want to consider when planning to implement Always Encrypted.
In my opinion Always Encrypted is a great technology, but it’s not like TDE where you can pretty much flick a switch and expect everything to work just as it did before. At a minimum level you will need to modify connection strings for applications ...