Skip to content

Commit 3027f52

Browse files
authored
Changes per PR reviewer
1 parent 471231d commit 3027f52

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sql-database/sql-database-connectivity-settings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Connectivity Settings for Azure SQL Database and Data Warehouse
2+
title: Connectivity settings for Azure SQL Database and Data Warehouse
33
description: This document explains TLS version choice and Proxy vs. Redirect setting for Azure SQL
44
services: sql-database
55
ms.service: sql-database
@@ -28,7 +28,7 @@ The connectivity settings are accessible from the **Firewalls and virtual networ
2828
![Screenshot of connectivity settings][1]
2929

3030

31-
## Deny Public Network Access
31+
## Deny public network access
3232
In the Azure Portal, when the **Deny public network access** setting is set to **Yes**, only connections via private endpoints are allowed. When this setting is set to **No**, clients can connect using the private or public endpoint.
3333

3434
After setting **Deny public network access** to **Yes**, login attempts from clients using public endpoint will fail with the following error:
@@ -75,7 +75,7 @@ az sql server update -n sql-server-name -g sql-server-group --set publicNetworkA
7575
## Minimal TLS Version
7676
Minimal TLS Version allows customer to control the version of [Transport Layer Security](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) for their Azure SQL Server.
7777

78-
We recommend setting Minimal TLS version to 1.2. For customers with applications that rely on older version of TLS, we recommend setting the Minimal TLS version per the requirements of your applications. For customers that rely on applications to connect using an unencrypted connection, we reccomend not setting any Minimal TLS Version. For additional information, refer to [TLS considerations for SQL Database connectivity](sql-database-connect-query.md#tls-considerations-for-sql-database-connectivity).
78+
We recommend setting Minimal TLS version to 1.2. For customers with applications that rely on older version of TLS, we recommend setting the Minimal TLS version per the requirements of your applications. For customers that rely on applications to connect using an unencrypted connection, we recommend not setting any Minimal TLS Version. For additional information, refer to [TLS considerations for SQL Database connectivity](sql-database-connect-query.md#tls-considerations-for-sql-database-connectivity).
7979

8080
After setting Minimal TLS version, login attempts from clients that are using a TLS version less than the Minimal TLS version of the server will fail with following error:
8181

0 commit comments

Comments
 (0)