You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-vnet-service-endpoint-rule-overview.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,7 @@ You have the option of using [role-based access control (RBAC)][rbac-what-is-813
58
58
59
59
> [!NOTE]
60
60
> In some cases the Azure SQL Database and the VNet-subnet are in different subscriptions. In these cases you must ensure the following configurations:
61
+
>
61
62
> - Both subscriptions must be in the same Azure Active Directory tenant.
62
63
> - The user has the required permissions to initiate operations, such as enabling service endpoints and adding a VNet-subnet to the given Server.
63
64
> - Both subscriptions must have the Microsoft.Sql provider registered.
@@ -128,7 +129,7 @@ PolyBase is commonly used to load data into Azure SQL Data Warehouse from Azure
128
129
> [!NOTE]
129
130
> - If you have a general-purpose v1 or blob storage account, you must **first upgrade to v2** using this [guide](https://docs.microsoft.com/azure/storage/common/storage-account-upgrade).
130
131
> - For known issues with Azure Data Lake Storage Gen2, please refer to this [guide](https://docs.microsoft.com/azure/storage/data-lake-storage/known-issues).
131
-
132
+
132
133
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL Data Warehouse which you've registered with Azure Active Directory (AAD) as in step#1.
133
134
134
135
> [!NOTE]
@@ -258,6 +259,7 @@ You must already have a subnet that is tagged with the particular Virtual Networ
258
259
259
260
> [!NOTE]
260
261
> The following statuses or states apply to the rules:
262
+
>
261
263
> - **Ready:** Indicates that the operation that you initiated has Succeeded.
262
264
> - **Failed:** Indicates that the operation that you initiated has Failed.
263
265
> - **Deleted:** Only applies to the Delete operation, and indicates that the rule has been deleted and no longer applies.
Copy file name to clipboardExpand all lines: articles/synapse-analytics/sql/overview-features.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ SQL pools and SQL on-demand capabilities enable you to use different database ob
29
29
| Tables |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-table-azure-sql-data-warehouse)| No, SQL on-demand capability can query only external data placed on [Azure Storage](#storage-options)|
30
30
| Views |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-view-transact-sql). Views can use [query language elements](#query-language) that are available in SQL pool. |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-view-transact-sql). Views can use [query language elements](#query-language) that are available in SQL on-demand. |
| Temporary tables |[Yes](https://docs.microsoft.com/azure/sql-data-warehouse/sql-data-warehouse-tables-temporary)| No |
32
+
| Temporary tables |[Yes](/sql-data-warehouse/sql-data-warehouse-tables-temporary.md)| No |
33
33
| Procedures |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-procedure-transact-sql)| No |
34
34
| Functions |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-function-sql-data-warehouse)| No |
35
35
| Triggers | No | No |
@@ -73,7 +73,7 @@ SQL pools and SQL on-demand enable you to use built-in security features to secu
73
73
| Storage AAD passthrough authentication | Yes, using `User Identity` credential | Yes, using `User Identity` credential |
74
74
| Storage SAS token authentication | Yes, using [DATABASE SCOPED CREDENTIAL](https://docs.microsoft.com/sql/t-sql/statements/create-database-scoped-credential-transact-sql?view=sql-server-ver15) in [EXTERNAL DATA SOURCE](https://docs.microsoft.com/sql/t-sql/statements/create-external-data-source-transact-sql?view=azure-sqldw-latest)| Yes, using [DATABASE SCOPED CREDENTIAL](https://docs.microsoft.com/sql/t-sql/statements/create-database-scoped-credential-transact-sql?view=sql-server-ver15) in [EXTERNAL DATA SOURCE](https://docs.microsoft.com/sql/t-sql/statements/create-external-data-source-transact-sql?view=azure-sqldw-latest) or instance-level [CREDENTIAL](https://docs.microsoft.com/sql/t-sql/statements/create-credential-transact-sql?view=sql-server-ver15). |
75
75
| Storage Access Key authentication | Yes, using [DATABASE SCOPED CREDENTIAL](https://docs.microsoft.com/sql/t-sql/statements/create-database-scoped-credential-transact-sql?view=sql-server-ver15) in [EXTERNAL DATA SOURCE](https://docs.microsoft.com/sql/t-sql/statements/create-external-data-source-transact-sql?view=azure-sqldw-latest)| No. |
76
-
| Storage Managed Identity authentication | Yes, using [Managed Service Identity Credential](https://docs.microsoft.com/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview?toc=/azure/sql-data-warehouse/toc.json#azure-sql-data-warehouse-polybase)| Yes, using `Managed Identity` credential. |
76
+
| Storage Managed Identity authentication | Yes, using [Managed Service Identity Credential](../../sql-database/sql-database-vnet-service-endpoint-rule-overview.md?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest)| Yes, using `Managed Identity` credential. |
77
77
| Storage Application identity authentication |[Yes](https://docs.microsoft.com/sql/t-sql/statements/create-external-data-source-transact-sql?view=azure-sqldw-latest)| No |
78
78
| Permissions - Object-level | Yes, including ability to GRANT, DENY, and REVOKE permissions to users | Yes, including ability to GRANT, DENY, and REVOKE permissions to users/logins on the system objects that are supported |
79
79
| Permissions - Schema-level | Yes, including ability to GRANT, DENY, and REVOKE permissions to users/logins on the schema | Yes, including ability to GRANT, DENY, and REVOKE permissions to users/logins on the schema |
0 commit comments