Skip to content

Commit 0238574

Browse files
committed
fixing more things
1 parent 10b67c9 commit 0238574

31 files changed

+82
-77
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52589,7 +52589,7 @@
5258952589
},
5259052590
{
5259152591
"source_path": "articles/sql-database/sql-database-geo-replication-security-config.md",
52592-
"redirect_url": "/azure/azure-sql/database/geo-replication-security-configure",
52592+
"redirect_url": "/azure/azure-sql/database/active-geo-replication-security-configure",
5259352593
"redirect_document_id": true
5259452594
},
5259552595
{

articles/azure-sql/database/active-geo-replication-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ To achieve real business continuity, adding database redundancy between datacent
104104

105105
## Preparing secondary database for failover
106106

107-
To ensure that your application can immediately access the new primary after failover, ensure the authentication requirements for your secondary server and database are properly configured. For details, see [SQL Database security after disaster recovery](geo-replication-security-configure.md). To guarantee compliance after failover, make sure that the backup retention policy on the secondary database matches that of the primary. These settings are not part of the database and are not replicated. By default, the secondary will be configured with a default PITR retention period of seven days. For details, see [SQL Database automated backups](automated-backups-overview.md).
107+
To ensure that your application can immediately access the new primary after failover, ensure the authentication requirements for your secondary server and database are properly configured. For details, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md). To guarantee compliance after failover, make sure that the backup retention policy on the secondary database matches that of the primary. These settings are not part of the database and are not replicated. By default, the secondary will be configured with a default PITR retention period of seven days. For details, see [SQL Database automated backups](automated-backups-overview.md).
108108

109109
> [!IMPORTANT]
110110
> If your database is a member of a failover group, you cannot initiate its failover using the geo-replication failover command. Use the failover command for the group. If you need to failover an individual database, you must remove it from the failover group first. See [failover groups](auto-failover-group-overview.md) for details.
@@ -289,4 +289,4 @@ As discussed previously, active geo-replication can also be managed programmatic
289289
- For a business continuity overview and scenarios, see [Business continuity overview](business-continuity-high-availability-disaster-recover-hadr-overview.md)
290290
- To learn about Azure SQL Database automated backups, see [SQL Database automated backups](automated-backups-overview.md).
291291
- To learn about using automated backups for recovery, see [Restore a database from the service-initiated backups](recovery-using-backups.md).
292-
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](geo-replication-security-configure.md).
292+
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md).

articles/azure-sql/database/auto-failover-group-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ When you are using auto-failover groups with automatic failover policy, any outa
3232
- [PowerShell: Failover Group](scripts/add-database-to-failover-group-powershell.md)
3333
- [REST API: Failover group](/rest/api/sql/failovergroups).
3434

35-
After failover, ensure the authentication requirements for your database and server, or instance are configured on the new primary. For details, see [SQL Database security after disaster recovery](geo-replication-security-configure.md).
35+
After failover, ensure the authentication requirements for your database and server, or instance are configured on the new primary. For details, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md).
3636

3737
To achieve real business continuity, adding database redundancy between datacenters is only part of the solution. Recovering an application (service) end-to-end after a catastrophic failure requires recovery of all components that constitute the service and any dependent services. Examples of these components include the client software (for example, a browser with a custom JavaScript), web front ends, storage, and DNS. It is critical that all components are resilient to the same failures and become available within the recovery time objective (RTO) of your application. Therefore, you need to identify all dependent services and understand the guarantees and capabilities they provide. Then, you must take adequate steps to ensure that your service functions during the failover of the services on which it depends. For more information about designing solutions for disaster recovery, see [Designing Cloud Solutions for Disaster Recovery Using active geo-replication](designing-cloud-solutions-for-disaster-recovery.md).
3838

@@ -472,4 +472,4 @@ As discussed previously, auto-failover groups and active geo-replication can als
472472
- For a business continuity overview and scenarios, see [Business continuity overview](business-continuity-high-availability-disaster-recover-hadr-overview.md)
473473
- To learn about Azure SQL Database automated backups, see [SQL Database automated backups](automated-backups-overview.md).
474474
- To learn about using automated backups for recovery, see [Restore a database from the service-initiated backups](recovery-using-backups.md).
475-
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](geo-replication-security-configure.md).
475+
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md).

articles/azure-sql/database/database-copy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ When you copy a database to a different server, the security principal that init
3131

3232
Regardless of the target server, all database users, their permissions, and their security identifiers (SIDs) are copied to the database copy. Using [contained database users](logins-create-manage.md) for data access ensures that the copied database has the same user credentials, so that after the copy is complete you can immediately access it with the same credentials.
3333

34-
If you use server level logins for data access and copy the database to a different server, the login-based access might not work. This can happen because the logins do not exist on the target server, or because their passwords and security identifiers (SIDs) are different. To learn about managing logins when you copy a database to a different server, see [How to manage Azure SQL Database security after disaster recovery](geo-replication-security-configure.md). After the copy operation to a different server succeeds, and before other users are remapped, only the login associated with the database owner, or the server administrator can log in to the copied database. To resolve logins and establish data access after the copying operation is complete, see [Resolve logins](#resolve-logins).
34+
If you use server level logins for data access and copy the database to a different server, the login-based access might not work. This can happen because the logins do not exist on the target server, or because their passwords and security identifiers (SIDs) are different. To learn about managing logins when you copy a database to a different server, see [How to manage Azure SQL Database security after disaster recovery](active-geo-replication-security-configure.md). After the copy operation to a different server succeeds, and before other users are remapped, only the login associated with the database owner, or the server administrator can log in to the copied database. To resolve logins and establish data access after the copying operation is complete, see [Resolve logins](#resolve-logins).
3535

3636
## Copy using the Azure portal
3737

@@ -160,11 +160,11 @@ If you want to see the operations under deployments in the resource group on the
160160

161161
## Resolve logins
162162

163-
After the new database is online on the target server, use the [ALTER USER](https://docs.microsoft.com/sql/t-sql/statements/alter-user-transact-sql?view=azuresqldb-current) statement to remap the users from the new database to logins on the target server. To resolve orphaned users, see [Troubleshoot Orphaned Users](https://docs.microsoft.com/sql/sql-server/failover-clusters/troubleshoot-orphaned-users-sql-server). See also [How to manage Azure SQL Database security after disaster recovery](geo-replication-security-configure.md).
163+
After the new database is online on the target server, use the [ALTER USER](https://docs.microsoft.com/sql/t-sql/statements/alter-user-transact-sql?view=azuresqldb-current) statement to remap the users from the new database to logins on the target server. To resolve orphaned users, see [Troubleshoot Orphaned Users](https://docs.microsoft.com/sql/sql-server/failover-clusters/troubleshoot-orphaned-users-sql-server). See also [How to manage Azure SQL Database security after disaster recovery](active-geo-replication-security-configure.md).
164164

165165
All users in the new database retain the permissions that they had in the source database. The user who initiated the database copy becomes the database owner of the new database. After the copying succeeds and before other users are remapped, only the database owner can log in to the new database.
166166

167-
To learn about managing users and logins when you copy a database to a different server, see [How to manage Azure SQL Database security after disaster recovery](geo-replication-security-configure.md).
167+
To learn about managing users and logins when you copy a database to a different server, see [How to manage Azure SQL Database security after disaster recovery](active-geo-replication-security-configure.md).
168168

169169
## Database copy errors
170170

@@ -188,5 +188,5 @@ The following errors can be encountered while copying a database in Azure SQL Da
188188

189189
## Next steps
190190

191-
* For information about logins, see [Manage logins](logins-create-manage.md) and [How to manage Azure SQL Database security after disaster recovery](geo-replication-security-configure.md).
191+
* For information about logins, see [Manage logins](logins-create-manage.md) and [How to manage Azure SQL Database security after disaster recovery](active-geo-replication-security-configure.md).
192192
* To export a database, see [Export the database to a BACPAC](database-export.md).

articles/azure-sql/database/disaster-recovery-guidance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For success with recovery to another data region using either failover groups or
3838
- Identify the server in another region to become the new primary server. For geo-restore, this is generally a server in the [paired region](../../best-practices-availability-paired-regions.md) for the region in which your database is located. This eliminates the additional traffic cost during the geo-restoring operations.
3939
- Identify, and optionally define, the server-level IP firewall rules needed on for users to access the new primary database.
4040
- Determine how you are going to redirect users to the new primary server, such as by changing connection strings or by changing DNS entries.
41-
- Identify, and optionally create, the logins that must be present in the master database on the new primary server, and ensure these logins have appropriate permissions in the master database, if any. For more information, see [SQL Database security after disaster recovery](geo-replication-security-configure.md)
41+
- Identify, and optionally create, the logins that must be present in the master database on the new primary server, and ensure these logins have appropriate permissions in the master database, if any. For more information, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md)
4242
- Identify alert rules that need to be updated to map to the new primary database.
4343
- Document the auditing configuration on the current primary database
4444
- Perform a [disaster recovery drill](disaster-recovery-drills.md). To simulate an outage for geo-restore, you can delete or rename the source database to cause application connectivity failure. To simulate an outage using failover groups, you can disable the web application or virtual machine connected to the database or failover the database to cause application connectivity failures.
@@ -93,7 +93,7 @@ You need to make sure that the firewall rules configured on server and on the da
9393

9494
### Configure logins and database users
9595

96-
You need to make sure that all the logins used by your application exist on the server which is hosting your recovered database. For more information, see [Security Configuration for geo-replication](geo-replication-security-configure.md).
96+
You need to make sure that all the logins used by your application exist on the server which is hosting your recovered database. For more information, see [Security Configuration for geo-replication](active-geo-replication-security-configure.md).
9797

9898
> [!NOTE]
9999
> You should configure and test your server firewall rules and logins (and their permissions) during a disaster recovery drill. These server-level objects and their configuration may not be available during the outage.

articles/azure-sql/database/firewall-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Database-level IP firewall rules enable clients to access certain (secure) datab
5050
We recommend that you use database-level IP firewall rules whenever possible. This practice enhances security and makes your database more portable. Use server-level IP firewall rules for administrators. Also use them when you have many databases that have the same access requirements, and you don't want to configure each database individually.
5151

5252
> [!NOTE]
53-
> For information about portable databases in the context of business continuity, see [Authentication requirements for disaster recovery](geo-replication-security-configure.md).
53+
> For information about portable databases in the context of business continuity, see [Authentication requirements for disaster recovery](active-geo-replication-security-configure.md).
5454
5555
## Server-level versus database-level IP firewall rules
5656

articles/azure-sql/database/how-to-content-reference-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ In this article you can find a content reference of various guides, scripts, and
4343
- [Configure dynamic data masking](dynamic-data-masking-configure-portal.md) to protect your sensitive data.
4444
- [Configure backup retention](long-term-backup-retention-configure.md) for a database to keep your backups on Azure Blob Storage.
4545
- [Configure geo-replication](active-geo-replication-overview.md) to keep a replica of your database in another region.
46-
- [Configure security for geo-replicas](geo-replication-security-configure.md).
46+
- [Configure security for geo-replicas](active-geo-replication-security-configure.md).
4747

4848
## Monitor and tune your database
4949

articles/azure-sql/database/logins-create-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ You can create accounts for non-administrative users using one of two methods:
100100

101101
- **Create a login**
102102

103-
Create a SQL login in the master database. Then create a user account in each database to which that user needs access and associate the user account with that login. This approach is preferred when the user must access multiple databases and you wish to keep the passwords synchronized. However, this approach has complexities when used with geo-replication as the login must be created on both the primary server and the secondary server(s). For more information, see [Configure and manage Azure SQL Database security for geo-restore or failover](geo-replication-security-configure.md).
103+
Create a SQL login in the master database. Then create a user account in each database to which that user needs access and associate the user account with that login. This approach is preferred when the user must access multiple databases and you wish to keep the passwords synchronized. However, this approach has complexities when used with geo-replication as the login must be created on both the primary server and the secondary server(s). For more information, see [Configure and manage Azure SQL Database security for geo-restore or failover](active-geo-replication-security-configure.md).
104104
- **Create a user account**
105105

106106
Create a user account in the database to which a user needs access (also called a [contained user](/sql/relational-databases/security/contained-database-users-making-your-database-portable).

0 commit comments

Comments
 (0)