Hi @Banerjee, Debasis
How about sign CLR assembly with asymmetric key.
Step 1: Create Asymmetric Key from Assembly File
USE master;
GO
CREATE ASYMMETRIC KEY CLRStringSplitKey FROM EXECUTABLE FILE = 'C:\CLRStringSplit.dll';
GO
Step 2: Create SQL Server Login linked to the Asymmetric Key
USE master;
GO
CREATE LOGIN CLRStringSplitKeyLogin FROM ASYMMETRIC KEY CLRStringSplitKey;
GO
Step 3: Grant UNSAFE assembly permission to the login created in Step 2
USE master;
GO
GRANT UNSAFE ASSEMBLY TO CLRStringSplitKeyLogin;
GO
Step 4: Create a SQL Server database user for the SQL Server login created in Step 2
USE SampleTest2017;
GO
CREATE USER CLRStringSplitKeyLogin FOR LOGIN CLRStringSplitKeyLogin;
GO
Step 5: Create CLR Assembly
USE SampleTest2017;
GO
CREATE ASSEMBLY CLRStringSplit FROM 'C:\CLRStringSplit.dll' WITH PERMISSION_SET = SAFE;
GO
Please refer to these two articles for more details:
Impact of CLR Strict Security configuration setting,
Stairway to SQLCLR Level 4: Security (EXTERNAL and UNSAFE Assemblies).
Best regards,
Cosmog Hong
If the answer is the right solution, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our Documentation to enable e-mail notifications if you want to receive the related email notification for this thread.