Skip to content

Commit 30ec366

Browse files
committed
update Azure SQL Connection String
1 parent 6a11809 commit 30ec366

File tree

33 files changed

+88
-88
lines changed

33 files changed

+88
-88
lines changed

articles/ai-services/metrics-advisor/encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,11 +69,11 @@ Metrics Advisor supports CMK and double encryption by using BYOS (bring your own
6969
1. Set 'Allow access to Azure services' as 'Yes'.
7070
2. Add your clientIP address to sign in to Azure Database for PostgreSQL.
7171

72-
- Get the access-token for your account with resource type 'https://ossrdbms-aad.database.windows.net'. The access token is the password you need to sign in to the Azure Database for PostgreSQL by your account. An example using `az` client:
72+
- Get the access-token for your account with resource type 'https://server-name.database.windows.net'. The access token is the password you need to sign in to the Azure Database for PostgreSQL by your account. An example using `az` client:
7373

7474
```
7575
az login
76-
az account get-access-token --resource https://ossrdbms-aad.database.windows.net
76+
az account get-access-token --resource https://server-name.database.windows.net
7777
```
7878

7979
- After getting the token, use it to sign in to your Azure Database for PostgreSQL. Replace the 'servername' as the one that you can find in the 'overview' of your Azure Database for PostgreSQL.

articles/app-service/includes/tutorial-connect-msi-azure-database/code-mysql-mi.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ using MySqlConnector;
2626
// });
2727
2828
var tokenRequestContext = new TokenRequestContext(
29-
new[] { "https://ossrdbms-aad.database.windows.net/.default" });
29+
new[] { "https://server-name.database.windows.net/.default" });
3030
AccessToken accessToken = await credential.GetTokenAsync(tokenRequestContext);
3131
// Open a connection to the MySQL server using the access token.
3232
string connectionString =
@@ -93,7 +93,7 @@ For more information, see [Use Java and JDBC with Azure Database for MySQL - Fle
9393
# cred = ManagedIdentityCredential(client_id=managed_identity_client_id)
9494

9595
# acquire token
96-
accessToken = cred.get_token('https://ossrdbms-aad.database.windows.net/.default')
96+
accessToken = cred.get_token('https://server-name.database.windows.net/.default')
9797

9898
# open connect to Azure MySQL with the access token.
9999
host = os.getenv('AZURE_MYSQL_HOST')
@@ -136,7 +136,7 @@ For more information, see [Use Java and JDBC with Azure Database for MySQL - Fle
136136
// });
137137

138138
// acquire token
139-
var accessToken = await credential.getToken('https://ossrdbms-aad.database.windows.net/.default');
139+
var accessToken = await credential.getToken('https://server-name.database.windows.net/.default');
140140

141141
const connection = mysql.createConnection({
142142
host: process.env.AZURE_MYSQL_HOST,

articles/app-service/includes/tutorial-connect-msi-azure-database/code-postgres-mi.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ using Npgsql;
3030
AccessToken accessToken = await sqlServerTokenProvider.GetTokenAsync(
3131
new TokenRequestContext(scopes: new string[]
3232
{
33-
"https://ossrdbms-aad.database.windows.net/.default"
33+
"https://server-name.database.windows.net/.default"
3434
}));
3535

3636
// Combine the token with the connection string from the environment variables provided by Service Connector.
@@ -102,7 +102,7 @@ For more information, see the following resources:
102102
# cred = ManagedIdentityCredential(client_id=managed_identity_client_id)
103103

104104
# Acquire the access token
105-
accessToken = cred.get_token('https://ossrdbms-aad.database.windows.net/.default')
105+
accessToken = cred.get_token('https://server-name.database.windows.net/.default')
106106

107107
# Combine the token with the connection string from the environment variables added by Service Connector to establish the connection.
108108
conn_string = os.getenv('AZURE_POSTGRESQL_CONNECTIONSTRING')
@@ -135,7 +135,7 @@ For more information, see the following resources:
135135
// });
136136

137137
// Acquire the access token.
138-
var accessToken = await credential.getToken('https://ossrdbms-aad.database.windows.net/.default');
138+
var accessToken = await credential.getToken('https://server-name.database.windows.net/.default');
139139

140140
// Use the token and the connection information from the environment variables added by Service Connector to establish the connection.
141141
(async () => {

articles/app-service/tutorial-connect-msi-azure-database.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ If you encounter any problem when creating a connection, refer to [Troubleshooti
197197
Connectivity to the Azure Database for MySQL in your code follows the `DefaultAzureCredential` pattern for all language stacks. `DefaultAzureCredential` is flexible enough to adapt to both the development environment and the Azure environment. When running locally, it can retrieve the logged-in Azure user from the environment of your choice (Visual Studio, Visual Studio Code, Azure CLI, or Azure PowerShell). When running in Azure, it retrieves the managed identity. So it's possible to have connectivity to database both at development time and in production. The pattern is as follows:
198198
199199
1. Instantiate a `DefaultAzureCredential` from the Azure Identity client library. If you're using a user-assigned identity, specify the client ID of the identity.
200-
2. Get an access token for Azure Database for MySQL: `https://ossrdbms-aad.database.windows.net/.default`.
200+
2. Get an access token for Azure Database for MySQL: `https://server-name.database.windows.net/.default`.
201201
3. Add the token to your connection string.
202202
4. Open the connection.
203203
@@ -208,7 +208,7 @@ Connectivity to the Azure Database for MySQL in your code follows the `DefaultAz
208208
Connectivity to the Azure Database for PostgreSQL in your code follows the `DefaultAzureCredential` pattern for all language stacks. `DefaultAzureCredential` is flexible enough to adapt to both the development environment and the Azure environment. When running locally, it can retrieve the logged-in Azure user from the environment of your choice (Visual Studio, Visual Studio Code, Azure CLI, or Azure PowerShell). When running in Azure, it retrieves the managed identity. So it's possible to have connectivity to database both at development time and in production. The pattern is as follows:
209209
210210
1. Instantiate a `DefaultAzureCredential` from the Azure Identity client library. If you're using a user-assigned identity, specify the client ID of the identity.
211-
2. Get an access token for Azure Database for PostgreSQL: `https://ossrdbms-aad.database.windows.net/.default`.
211+
2. Get an access token for Azure Database for PostgreSQL: `https://server-name.database.windows.net/.default`.
212212
3. Add the token to your connection string.
213213
4. Open the connection.
214214

articles/connectors/connectors-create-api-sqlazure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ In the connection information box, complete the following steps:
264264

265265
| Property | Required | Description |
266266
|----------|----------|-------------|
267-
| **Server name** | Yes | The address for your SQL server, for example, **Fabrikam-Azure-SQL.database.windows.net** |
267+
| **Server name** | Yes | The address for your SQL server, for example, **server-name.database.windows.net** |
268268
| **Database name** | Yes | The name for your SQL database, for example, **Fabrikam-Azure-SQL-DB** |
269269
| **Table name** | Yes | The table that you want to use, for example, **SalesLT.Customer** |
270270

@@ -311,7 +311,7 @@ In the connection information box, complete the following steps:
311311

312312
| Property | Required | Description |
313313
|----------|----------|-------------|
314-
| **SQL server name** | Yes | The address for your SQL server, for example, `Fabrikam-Azure-SQL.database.windows.net` |
314+
| **SQL server name** | Yes | The address for your SQL server, for example, `server-name.database.windows.net` |
315315
| **SQL database name** | Yes | The name for your SQL Server database, for example, `Fabrikam-Azure-SQL-DB` |
316316
| **Username** | Yes | Your user name for the SQL server and database |
317317
| **Password** | Yes | Your password for the SQL server and database |

articles/data-factory/connector-odbc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The following properties are supported for ODBC linked service:
7575
| Property | Description | Required |
7676
|:--- |:--- |:--- |
7777
| type | The type property must be set to: **Odbc** | Yes |
78-
| connectionString | The connection string excluding the credential portion. You can specify the connection string with pattern like `Driver={SQL Server};Server=Server.database.windows.net; Database=TestDatabase;`, or use the system DSN (Data Source Name) you set up on the Integration Runtime machine with `DSN=<name of the DSN on IR machine>;` (you need still specify the credential portion in linked service accordingly).<br>You can also put a password in Azure Key Vault and pull the `password` configuration out of the connection string. Refer to [Store credentials in Azure Key Vault](store-credentials-in-key-vault.md) with more details.| Yes |
78+
| connectionString | The connection string excluding the credential portion. You can specify the connection string with pattern like `Driver={SQL Server};Server=server-name.database.windows.net; Database=TestDatabase;`, or use the system DSN (Data Source Name) you set up on the Integration Runtime machine with `DSN=<name of the DSN on IR machine>;` (you need still specify the credential portion in linked service accordingly).<br>You can also put a password in Azure Key Vault and pull the `password` configuration out of the connection string. Refer to [Store credentials in Azure Key Vault](store-credentials-in-key-vault.md) with more details.| Yes |
7979
| authenticationType | Type of authentication used to connect to the ODBC data store.<br/>Allowed values are: **Basic** and **Anonymous**. | Yes |
8080
| userName | Specify user name if you are using Basic authentication. | No |
8181
| password | Specify password for the user account you specified for the userName. Mark this field as a SecureString to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |

articles/data-factory/how-to-invoke-ssis-package-azure-enabled-dtexec.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The utility is installed at `{SSMS Folder}\Common7\IDE\CommonExtensions\Microsof
6868
> AzureDTExec.exe ^
6969
/F \\MyStorageAccount.file.core.windows.net\MyFileShare\MyPackage.dtsx ^
7070
/Conf \\MyStorageAccount.file.core.windows.net\MyFileShare\MyConfig.dtsConfig ^
71-
/Conn "MyConnectionManager;Data Source=MyDatabaseServer.database.windows.net;User ID=MyAdminUsername;Password=MyAdminPassword;Initial Catalog=MyDatabase" ^
71+
/Conn "MyConnectionManager;Data Source=server-name.database.windows.net;User ID=MyAdminUsername;Password=MyAdminPassword;Initial Catalog=MyDatabase" ^
7272
/Set \package.variables[MyVariable].Value;MyValue ^
7373
/De MyEncryptionPassword
7474
```

articles/hdinsight-aks/flink/flink-table-api-and-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ CREATE TABLE student_information (
6262
PRIMARY KEY (id) NOT ENFORCED
6363
) WITH (
6464
'connector' = 'jdbc',
65-
'url' = 'jdbc:sqlserver://servername.database.windows.net;database=dbname;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30',
65+
'url' = 'jdbc:sqlserver://server-name.database.windows.net;database=dbname;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30',
6666
'table-name' = 'students',
6767
'username' = 'username',
6868
'password' = 'password'

articles/hdinsight/hadoop/apache-hadoop-use-sqoop-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ $pw = ConvertTo-SecureString -String $httpPassword -AsPlainText -Force
4242
$httpCredential = New-Object System.Management.Automation.PSCredential($httpUserName,$pw)
4343
4444
# Connection string
45-
$connectionString = "jdbc:sqlserver://$sqlServerName.database.windows.net;user=$sqlServerLogin@$sqlServerName;password=$sqlDatabasePassword;database=$sqlDatabaseName"
45+
$connectionString = "jdbc:sqlserver://$server-name.database.windows.net;user=$sqlServerLogin@$sqlServerName;password=$sqlDatabasePassword;database=$sqlDatabaseName"
4646
4747
# start export
4848
New-AzHDInsightSqoopJobDefinition `

articles/hdinsight/interactive-query/apache-hive-migrate-workloads.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,7 +350,7 @@ This step uses the [`Hive Schema Tool`](https://cwiki.apache.org/confluence/disp
350350
1. From the HDInsight 4.0 cluster, execute `schematool` to upgrade the target HDInsight 3.6 metastore. Edit the following shell script to add your SQL server name, database name, username, and password. Open an [SSH Session](../hdinsight-hadoop-linux-use-ssh-unix.md) on the headnode and run it.
351351

352352
```sh
353-
SERVER='servername.database.windows.net' # replace with your SQL Server
353+
SERVER='server-name.database.windows.net' # replace with your SQL Server
354354
DATABASE='database' # replace with your 3.6 metastore SQL Database
355355
USERNAME='username' # replace with your 3.6 metastore username
356356
PASSWORD='password' # replace with your 3.6 metastore password

0 commit comments

Comments
 (0)