Skip to content

Commit 21992b4

Browse files
committed
fixing toc and missing includes
1 parent 4989fb6 commit 21992b4

File tree

122 files changed

+253
-96
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+253
-96
lines changed

articles/azure-sql/database/aad-authentication-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -431,7 +431,7 @@ Use this method if you are logged into Windows using your Azure Active Directory
431431

432432
![Select AD Integrated Authentication][11]
433433

434-
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. For more information, see the article [Multi-factor AAD auth](../mfa-authentication-ssms-overview.md#azure-ad-domain-name-or-tenant-id-parameter) on the differences between the Connection Properties for SSMS 17.x and 18.x.
434+
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. For more information, see the article [Multi-factor AAD auth](authentication-mfa-ssms-overview.md#azure-ad-domain-name-or-tenant-id-parameter) on the differences between the Connection Properties for SSMS 17.x and 18.x.
435435

436436
![Select the database name][13]
437437

articles/azure-sql/database/active-directory-interactive-connect-azure-sql-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Starting in .NET Framework version 4.7.2, the enum [`SqlAuthenticationMethod`](h
3535

3636
For information about how to configure Azure AD to require Multi-Factor Authentication, see [Getting started with Azure Multi-Factor Authentication in the cloud](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-cloud).
3737

38-
For screenshots of these dialog boxes, see [Configure multi-factor authentication for SQL Server Management Studio and Azure AD](../mfa-authentication-ssms-configure.md).
38+
For screenshots of these dialog boxes, see [Configure multi-factor authentication for SQL Server Management Studio and Azure AD](authentication-mfa-ssms-configure.md).
3939

4040
> [!TIP]
4141
> You can search .NET Framework APIs with the [.NET API Browser tool page](https://docs.microsoft.com/dotnet/api/).
@@ -134,7 +134,7 @@ Run SSMS from the same computer, in the same building, where you plan to run the
134134

135135
Run SSMS again, this time with **Authentication** set to **Azure Active Directory - Universal with MFA**. This option requires SSMS version 17.5 or later.
136136

137-
For more information, see [Configure Multi-Factor Authentication for SSMS and Azure AD](../mfa-authentication-ssms-configure.md).
137+
For more information, see [Configure Multi-Factor Authentication for SSMS and Azure AD](authentication-mfa-ssms-configure.md).
138138

139139
> [!NOTE]
140140
> If you are a guest user in the database, you also need to provide the Azure AD domain name for the database: Select **Options** > **AD domain name or tenant ID**. To find the domain name in the Azure portal, select **Azure Active Directory** > **Custom domain names**. In the C# example program, providing a domain name is not necessary.

articles/azure-sql/database/application-authentication-get-client-id-keys.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.reviewer:
1313
ms.date: 03/12/2019
1414
---
1515
# Get the required values for authenticating an application to access Azure SQL Database from code
16+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1617

1718
To create and manage SQL Database from code you must register your app in the Azure Active Directory (AAD) domain in the subscription where your Azure resources have been created.
1819

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: Configure multi-factor authentication
3+
titleSuffix: Azure SQL Database & SQL Managed Instance & Azure Synapse Analytics
4+
description: Learn how to use Multi-Factored Authentication with SSMS for Azure SQL Database, Azure SQL Managed Instance and Azure Synapse Analytics.
5+
services: sql-database
6+
ms.service: sql-database
7+
ms.subservice: security
8+
ms.custom: has-adal-ref, sqldbrb=3
9+
ms.devlang:
10+
ms.topic: conceptual
11+
author: GithubMirek
12+
ms.author: mireks
13+
ms.reviewer: vanto
14+
ms.date: 08/27/2019
15+
---
16+
# Configure multi-factor authentication for SQL Server Management Studio and Azure AD
17+
[!INCLUDE[appliesto-sqldb-sqlmi-asa](includes/appliesto-sqldb-sqlmi-asa.md)]
18+
19+
This article shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to [Azure SQL Database](database/sql-database-paas-overview.md), [Azure SQL Managed Instance](managed-instance/sql-managed-instance-paas-overview.md) and [Azure Synapse Analytics (formerly SQL DW)](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md). For an overview of multi-factor authentication, see [Universal Authentication with SQL Database, SQL Managed Instance, and Azure Synapse (SSMS support for MFA)](../database/authentication-mfa-ssms-overview.md).
20+
21+
> [!IMPORTANT]
22+
> Databases in Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse (formerly Azure SQL Data Warehouse) are referred to collectively in the remainder of this article as databases, and the server is referring to the [server](database/logical-servers.md) that hosts databases for Azure SQL Database and Azure Synapse.
23+
24+
## Configuration steps
25+
26+
1. **Configure an Azure Active Directory** - For more information, see [Administering your Azure AD directory](https://msdn.microsoft.com/library/azure/hh967611.aspx), [Integrating your on-premises identities with Azure Active Directory](../active-directory/hybrid/whatis-hybrid-identity.md), [Add your own domain name to Azure AD](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), [Microsoft Azure now supports federation with Windows Server Active Directory](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), and [Manage Azure AD using Windows PowerShell](https://msdn.microsoft.com/library/azure/jj151815.aspx).
27+
2. **Configure MFA** - For step-by-step instructions, see [What is Azure Multi-Factor Authentication?](../active-directory/authentication/multi-factor-authentication.md), [Conditional Access (MFA) with Azure SQL Database and Data Warehouse](database/conditional-access-configure.md). (Full Conditional Access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
28+
3. **Configure Azure AD Authentication** - For step-by-step instructions, see [Connecting to SQL Database, SQL Managed Instance, or Azure Synapse using Azure Active Directory Authentication](database/aad-authentication-overview.md).
29+
4. **Download SSMS** - On the client computer, download the latest SSMS, from [Download SQL Server Management Studio (SSMS)](https://msdn.microsoft.com/library/mt238290.aspx).
30+
31+
## Connecting by using universal authentication with SSMS
32+
33+
The following steps show how to connect using the latest SSMS.
34+
35+
1. To connect using Universal Authentication, on the **Connect to Server** dialog box in SQL Server Management Studio (SSMS), select **Active Directory - Universal with MFA support**. (If you see **Active Directory Universal Authentication** you are not on the latest version of SSMS.)
36+
![1mfa-universal-connect][1]
37+
2. Complete the **User name** box with the Azure Active Directory credentials, in the format `[email protected]`.
38+
![1mfa-universal-connect-user](./media/authentication-mfa-ssms-configure/1mfa-universal-connect-user.png)
39+
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database, SQL Managed Instance, and Azure Synapse (SSMS support for MFA)](../database/authentication-mfa-ssms-overview.md).
40+
![mfa-no-tenant-ssms](./media/authentication-mfa-ssms-configure/mfa-no-tenant-ssms.png)
41+
42+
However, If you are connecting as a guest user using SSMS 17.x or older, you must click **Options**, and on the **Connection Property** dialog box, and complete the **AD domain name or tenant ID** box.
43+
![mfa-tenant-ssms](./media/authentication-mfa-ssms-configure/mfa-tenant-ssms.png)
44+
45+
4. Select **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](../database/authentication-mfa-ssms-overview.md). Then click **Connect**.
46+
5. When the **Sign in to your account** dialog box appears, provide the account and password of your Azure Active Directory identity. No password is required if a user is part of a domain federated with Azure AD.
47+
![2mfa-sign-in][2]
48+
49+
> [!NOTE]
50+
> For Universal Authentication with an account that does not require MFA, you connect at this point. For users requiring MFA, continue with the following steps:
51+
>
52+
53+
6. Two MFA setup dialog boxes might appear. This one time operation depends on the MFA administrator setting, and therefore may be optional. For an MFA enabled domain this step is sometimes pre-defined (for example, the domain requires users to use a smartcard and pin).
54+
![3mfa-setup][3]
55+
7. The second possible one time dialog box allows you to select the details of your authentication method. The possible options are configured by your administrator.
56+
![4mfa-verify-1][4]
57+
8. The Azure Active Directory sends the confirming information to you. When you receive the verification code, enter it into the **Enter verification code** box, and click **Sign in**.
58+
![5mfa-verify-2][5]
59+
60+
When verification is complete, SSMS connects normally presuming valid credentials and firewall access.
61+
62+
## Next steps
63+
64+
- For an overview of multi-factor authentication, see [Universal Authentication with SQL Database, SQL Managed Instance, and Azure Synapse (SSMS support for MFA)](../database/authentication-mfa-ssms-overview.md).
65+
- Grant others access to your database: [SQL Database Authentication and Authorization: Granting Access](database/logins-create-manage.md)
66+
- Make sure others can connect through the firewall: [Configure a server-level firewall rule using the Azure portal](/database/firewall-configure.md)
67+
- When using **Active Directory- Universal with MFA** authentication, ADAL tracing is available beginning with [SSMS 17.3](https://docs.microsoft.com/sql/ssms/download-sql-server-management-studio-ssms). Off by default, you can turn on ADAL tracing by using the **Tools**, **Options** menu, under **Azure Services**, **Azure Cloud**, **ADAL Output Window Trace Level**, followed by enabling **Output** in the **View** menu. The traces are available in the output window when selecting **Azure Active Directory option**.

articles/azure-sql/mfa-authentication-ssms-overview.md renamed to articles/azure-sql/database/authentication-mfa-ssms-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure SQL Database, Azure Managed Instance, and Azure Synapse Analytics support
2424

2525
For all the features discussed in this article, use at least July 2017, version 17.2. The most recent connection dialog box, should look similar to the following image:
2626

27-
![1mfa-universal-connect](./media/mfa-authentication-ssms-overview/1mfa-universal-connect.png "Completes the User name box.")
27+
![1mfa-universal-connect](./media/authentication-mfa-ssms-overview/1mfa-universal-connect.png "Completes the User name box.")
2828

2929
## The five authentication options
3030

@@ -42,16 +42,16 @@ The interactive method that also supports Azure multi-factor authentication (MFA
4242
Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication with a range of easy verification options (phone call, text message, smart cards with pin, or mobile app notification), allowing users to choose the method they prefer. Interactive MFA with Azure AD can result in a pop-up dialog box for validation.
4343

4444
For a description of Multi-Factor Authentication, see [Multi-Factor Authentication](../active-directory/authentication/multi-factor-authentication.md).
45-
For configuration steps, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](mfa-authentication-ssms-configure.md).
45+
For configuration steps, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](../database/authentication-mfa-ssms-configure.md).
4646

4747
### Azure AD domain name or tenant ID parameter
4848

4949
Beginning with [SSMS version 17](https://docs.microsoft.com/sql/ssms/download-sql-server-management-studio-ssms), users that are imported into the current Active Directory from other Azure Active Directories as guest users, can provide the Azure AD domain name, or tenant ID when they connect. Guest users include users invited from other Azure ADs, Microsoft accounts such as outlook.com, hotmail.com, live.com, or other accounts like gmail.com. This information, allows **Active Directory Universal with MFA Authentication** to identify the correct authenticating authority. This option is also required to support Microsoft accounts (MSA) such as outlook.com, hotmail.com, live.com, or non-MSA accounts. All these users who want to be authenticated using Universal Authentication must enter their Azure AD domain name or tenant ID. This parameter represents the current Azure AD domain name or tenant ID, the Azure Server is linked with. For example, if Azure Server is associated with Azure AD domain `contosotest.onmicrosoft.com` where user `[email protected]` is hosted as an imported user from Azure AD domain `contosodev.onmicrosoft.com`, the domain name required to authenticate this user is `contosotest.onmicrosoft.com`. When the user is a native user of the Azure AD linked to Azure Server, and is not an MSA account, no domain name or tenant ID is required. To enter the parameter (beginning with SSMS version 17.2), in the **Connect to Database** dialog box, complete the dialog box, selecting **Active Directory - Universal with MFA** authentication, click **Options**, complete the **User name** box, and then click the **Connection Properties** tab. Check the **AD domain name or tenant ID** box, and provide authenticating authority, such as the domain name (**contosotest.onmicrosoft.com**) or the GUID of the tenant ID.
50-
![mfa-tenant-ssms](./media/mfa-authentication-ssms-overview/mfa-tenant-ssms.png)
50+
![mfa-tenant-ssms](./media/authentication-mfa-ssms-overview/mfa-tenant-ssms.png)
5151

5252
If you are running SSMS 18.x or later, The AD domain name or tenant ID is no longer needed for guest users because 18.x or later automatically recognizes it.
5353

54-
![mfa-tenant-ssms](./media/mfa-authentication-ssms-overview/mfa-no-tenant-ssms.png)
54+
![mfa-tenant-ssms](./media/authentication-mfa-ssms-overview/mfa-no-tenant-ssms.png)
5555

5656
### Azure AD business to business support
5757

@@ -69,7 +69,7 @@ Azure AD users that are supported for Azure AD B2B scenarios as guest users (see
6969

7070
## Next steps
7171

72-
- For configuration steps, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](mfa-authentication-ssms-configure.md).
72+
- For configuration steps, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](../database/authentication-mfa-ssms-configure.md).
7373
- Grant others access to your database: [SQL Database Authentication and Authorization: Granting Access](database/logins-create-manage.md)
7474
- Make sure others can connect through the firewall: [Configure a server-level firewall rule using the Azure portal](database/firewall-configure.md)
7575
- [Configure and manage Azure Active Directory authentication with SQL Database or Azure Synapse](database/aad-authentication-configure.md)

articles/azure-sql/database/clustering-model-build-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ROBOTS: NOINDEX
1717
---
1818

1919
# Tutorial: Build a clustering model in R with Azure SQL Database Machine Learning Services (preview)
20+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
2021

2122
In part two of this three-part tutorial series, you'll build a K-Means model in R to perform clustering. In the next part of this series, you'll deploy this model in a SQL database with Azure SQL Database Machine Learning Services (preview).
2223

articles/azure-sql/database/clustering-model-deploy-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ROBOTS: NOINDEX
1717
---
1818

1919
# Tutorial: Deploy a clustering model in R with Azure SQL Database Machine Learning Services (preview)
20+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
2021

2122
In part three of this three-part tutorial series, you'll deploy a clustering model, developed in R, into a SQL database using Azure SQL Database Machine Learning Services (preview).
2223

articles/azure-sql/database/clustering-model-prepare-data-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ROBOTS: NOINDEX
1717
---
1818

1919
# Tutorial: Prepare data to perform clustering in R with Azure SQL Database Machine Learning Services (preview)
20+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
2021

2122
In part one of this three-part tutorial series, you'll import and prepare the data from an Azure SQL database using R. Later in this series, you'll use this data to train and deploy a clustering model in R with Azure SQL Database Machine Learning Services (preview).
2223

articles/azure-sql/database/conditional-access-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The following steps show how to configure Azure SQL Database, SQL Managed Instan
2222
## Prerequisites
2323

2424
- You must configure your SQL Database, SQL Managed Instance, or SQL pool in Azure Synapse to support Azure Active Directory authentication. For specific steps, see [Configure and manage Azure Active Directory authentication with SQL Database or Azure Synapse](aad-authentication-configure.md).
25-
- When multi-factor authentication is enabled, you must connect with at supported tool, such as the latest SQL Server Management Studio (SSMS). For more information, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](../mfa-authentication-ssms-configure.md).
25+
- When multi-factor authentication is enabled, you must connect with at supported tool, such as the latest SQL Server Management Studio (SSMS). For more information, see [Configure Azure SQL Database multi-factor authentication for SQL Server Management Studio](authentication-mfa-ssms-configure.md).
2626

2727
## Configure conditional access
2828

articles/azure-sql/database/connect-excel.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.reviewer:
1313
ms.date: 02/12/2019
1414
---
1515
# Connect Excel to Azure SQL Database and create a report
16+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1617

1718
Connect Excel to Azure SQL Database and import data and create tables and charts based on values in the database. In this tutorial you will set up the connection between Excel and a database table, save the file that stores data and the connection information for Excel, and then create a pivot chart from the database values.
1819

0 commit comments

Comments
 (0)