Security is always high for installation to customer so is it not about time you encripted the connection string in your web.config file?
This is how it looks like before encrypting:
<connectionStrings> <add name="Pubs" connectionString="Server=localhost;Integrated Security=True;Database=Pubs" providerName="System.Data.SqlClient" /> <add name="Northwind" connectionString="Server=localhost;Integrated Security=True;Database=Northwind" providerName="System.Data.SqlClient" /> </connectionStrings>
We can encrypt any section of your Web.config file on-the-fly and programatically. If you have full access to your Web server, you can encrypt your connection strings with this single command-line located in the in the %windows%\Microsoft.NET\Framework\versionNumber folder:
aspnet_regiis -pe "connectionStrings" -app "/SampleApplication"
Now, the section in your Web.config file will look like this:
<connectionStrings> <EncryptedData> <CipherData> <CipherValue>AQAAANCMndjHoAw...</CipherValue> </CipherData> </EncryptedData> </connectionStrings>
If you can’t execute commands in your web server, for example, when using shared hosting, you still can encrypt it programatically:
Configuration config = Configuration.GetWebConfiguration(Request.ApplicationPath); ConfigurationSection section = config.Sections["connectionStrings"]; section.ProtectSection ("DataProtectionConfigurationProvider"); config.Update();
References: Encrypting Web.Config Values in ASP.NET 2.0