Transparent Data Encryption was the cause.
TDE is meant to protect data at rest. It encrypts the database files, temp files, and backups. The key is stored in a secure location, often a key vault. Without the right key, the data is unreadable. This is good for security, but it can break unexpected workflows—like generating procurement tickets across systems.
When a procurement workflow interacts with a TDE-enabled database, every query must respect encryption rules. Service accounts need access to the encryption key before they can read or write. If a ticket generation process depends on an ETL job, a reporting tool, or any middleware, that entire chain must have the correct permissions. Missing one link causes an error.
Many implementation issues come from mismatched key versions or disabled access to the key vault. Rotating the encryption key in production without syncing credentials can stop ticket creation instantly. Logs will show timeouts, access denied, or even corrupted reads if the process attempts to interpret encrypted data without the key.