|
1 | 1 | ---
|
2 |
| -title: Connect to a secure storage account from your Azure Synapse workspace |
3 |
| -description: This article will teach you how to connect to a secure storage account from your Azure Synapse workspace |
| 2 | +title: Connect to a secure storage account from Azure Synapse workspace |
| 3 | +description: Learn how to connect to a secure storage account from your Azure Synapse workspace. |
4 | 4 | author: ashinMSFT
|
5 | 5 | ms.service: azure-synapse-analytics
|
6 | 6 | ms.topic: how-to
|
7 | 7 | ms.subservice: security
|
8 |
| -ms.date: 02/10/2021 |
| 8 | +ms.date: 02/05/2025 |
9 | 9 | ms.author: seshin
|
10 | 10 | ms.reviewer: whhender
|
11 | 11 | ---
|
12 | 12 |
|
13 |
| -# Connect to a secure Azure storage account from your Synapse workspace |
14 |
| - |
15 |
| -This article will teach you how to connect to a secure Azure storage account from your Azure Synapse workspace. You can link an Azure storage account to your Synapse workspace when you create your workspace. You can link more storage accounts after you create your workspace. |
| 13 | +# Connect to a secure Azure storage account from a Synapse workspace |
16 | 14 |
|
| 15 | +This article explains how to connect to a secure Azure storage account from your Azure Synapse workspace. You can link an Azure storage account to your Synapse workspace when you create your workspace. You can link more storage accounts after you create your workspace. |
17 | 16 |
|
18 | 17 | ## Secured Azure storage accounts
|
19 |
| -Azure storage provides a layered security model that enables you to secure and control access to your storage accounts. You can configure IP firewall rules to grant traffic from selected public IP address ranges access to your storage account. You can also configure network rules to grant traffic from selected virtual networks access to your storage account. You can combine IP firewall rules that allow access from selected IP address ranges and network rules that grant access from selected virtual networks on the same storage account. These rules apply to the public endpoint of a storage account. You do not need any access rules to allow traffic from Managed private endpoints created in your workspace to a storage account. Storage firewall rules can be applied to existing storage accounts, or to new storage accounts when you create them. You can learn more about securing your storage account [here](../../storage/common/storage-network-security.md). |
| 18 | + |
| 19 | +Azure storage provides a layered security model that allows you to secure and control access to your storage accounts. You can configure IP firewall rules to grant traffic from selected public IP address ranges access to your storage account. You can also configure network rules to grant traffic from selected virtual networks access to your storage account. You can combine IP firewall rules that allow access from selected IP address ranges and network rules that grant access from selected virtual networks on the same storage account. |
| 20 | + |
| 21 | +These rules apply to the public endpoint of a storage account. You don't need any access rules to allow traffic from managed private endpoints created in your workspace to a storage account. Storage firewall rules can be applied to existing storage accounts, or to new storage accounts when you create them. To learn more about securing your storage account, see [Configure Azure Storage firewalls and virtual networks](../../storage/common/storage-network-security.md). |
20 | 22 |
|
21 | 23 | ## Synapse workspaces and virtual networks
|
22 |
| -When you create a Synapse workspace, you can choose to enable a Managed virtual network to be associated with it. If you do not enable Managed virtual network for your workspace when you create it, your workspace is in a shared virtual network along with other Synapse workspaces that do not have a Managed virtual network associated with it. If you enabled Managed virtual network when you created the workspace, then your workspace is associated with a dedicated virtual network managed by Azure Synapse. These virtual networks are not created in your customer subscription. Therefore, you will not be able to grant traffic from these virtual networks access to your secured storage account using network rules described above. |
| 24 | + |
| 25 | +When you create a Synapse workspace, you can choose to allow a managed virtual network to be associated with it. |
| 26 | + |
| 27 | +If you *don't* enable a managed virtual network for your workspace when you create it, your workspace is in a shared virtual network along with other Synapse workspaces that don't have a managed virtual network associated with it. |
| 28 | + |
| 29 | +If you *do* enable managed virtual network when you create the workspace, then your workspace is associated with a dedicated virtual network managed by Azure Synapse. These virtual networks aren't created in your customer subscription. Therefore, you can't grant traffic from these virtual networks access to your secured storage account using network rules described above. |
23 | 30 |
|
24 | 31 | ## Access a secured storage account
|
25 |
| -Synapse operates from networks that cannot be included in your network rules. The following needs to be done to enable access from your workspace to your secure storage account. |
26 | 32 |
|
27 |
| -* Create an Azure Synapse workspace with a managed virtual network associated with it and create managed private endpoints from it to the secure storage account. |
| 33 | +Synapse operates from networks that can't be included in your network rules. Use the following steps to enable access from your workspace to your secure storage account. |
| 34 | + |
| 35 | +1. Create an Azure Synapse workspace with a managed virtual network associated with it, and create managed private endpoints from it to the secure storage account. If you use the Azure portal to create your workspace, you can enable **Managed virtual network** under the **Networking** tab. |
28 | 36 |
|
29 |
| - If you use Azure Portal to create your workspace, you can enable managed virtual network under the **Networking** tab as shown below. If you enable managed virtual network or Synapse determines that the primary storage account is a secure storage account, then you have the option to create a managed private endpoint connection request to the secure storage account as shown below. The storage account owner will need to approve the connection request to establish the private link. Alternatively, Synapse will approve this connection request if the user creating an Apache Spark pool in the workspace has sufficient privileges to approve the connection request. |
30 |
| - |
31 |
| - |
| 37 | + :::image type="content" source="media/connect-to-a-secure-storage-account/enable-managed-virtual-network-managed-private-endpoint.png" alt-text="Screenshot that shows the Manage virtual network option under the Networking tab."::: |
32 | 38 |
|
| 39 | +1. If you enable **Managed virtual network** or if Synapse determines that the primary storage account is a secure storage account, then you have the option to **Create managed private endpoint to primary storage account**, as shown. The storage account owner needs to approve the connection request to establish the private link. Alternatively, Synapse approves this connection request if the user creating an Apache Spark pool in the workspace has sufficient privileges to approve the connection request. |
33 | 40 |
|
34 |
| -* Grant your Azure Synapse workspace access to your secure storage account as a trusted Azure service. As a trusted service, Azure Synapse will then use strong authentication to securely connect to your storage account. |
| 41 | +1. Grant your Azure Synapse workspace access to your secure storage account as a trusted Azure service. As a trusted service, Azure Synapse then uses strong authentication to securely connect to your storage account. |
35 | 42 |
|
36 | 43 | ### Create a Synapse workspace with a managed virtual network and create managed private endpoints to your storage account
|
37 |
| -You can follow [these steps](./synapse-workspace-managed-vnet.md) to create a Synapse workspace that has a managed virtual network associated with it. Once the workspace with an associated managed virtual network is created, you can create a managed private endpoint to your secure storage account by following the steps listed [here](./how-to-create-managed-private-endpoints.md). |
| 44 | + |
| 45 | +To create a Synapse workspace that has a managed virtual network associated with it, see [Azure Synapse Analytics Managed Virtual Network](./synapse-workspace-managed-vnet.md#create-an-azure-synapse-workspace-with-a-managed-workspace-virtual-network). |
| 46 | + |
| 47 | +After the workspace with an associated managed virtual network is created, you can create a managed private endpoint to your secure storage account. To learn how, see [Create a Managed private endpoint to your data source](./how-to-create-managed-private-endpoints.md). |
38 | 48 |
|
39 | 49 | ### Grant your Azure Synapse workspace access to your secure storage account as a trusted Azure service
|
40 |
| -Analytic capabilities such as Dedicated SQL pool and Serverless SQL pool use multi-tenant infrastructure that is not deployed into the managed virtual network. In order for traffic from these capabilities to access the secured storage account, you must configure access to your storage account based on the workspace's system-assigned managed identity by following the steps below. |
41 | 50 |
|
42 |
| -In Azure portal, navigate to your secured storage account. Select **Networking** from the left navigation pane. In the **Resource instances** section, select *Microsoft.Synapse/workspaces* as the **Resource type** and enter your workspace name for **Instance name**. Select **Save**. |
| 51 | +Analytic capabilities such as dedicated SQL pool and serverless SQL pool use multitenant infrastructure that isn't deployed into the managed virtual network. In order for traffic from these capabilities to access the secured storage account, you must configure access to your storage account based on the workspace's system-assigned managed identity by following these steps. |
43 | 52 |
|
44 |
| - |
| 53 | +1. In the Azure portal, navigate to your secured storage account and select **Networking** from the left navigation pane. |
45 | 54 |
|
46 |
| -You should now be able to access your secured storage account from the workspace. |
| 55 | + :::image type="content" source="media/connect-to-a-secure-storage-account/secured-storage-access.png" alt-text="Screenshot of the storage account network configuration." lightbox="media/connect-to-a-secure-storage-account/secured-storage-access.png"::: |
47 | 56 |
|
| 57 | +1. In the **Resource instances** section, select *Microsoft.Synapse/workspaces* as the **Resource type** and enter your workspace name for **Instance name**. Select **Save**. |
48 | 58 |
|
49 |
| -## Next steps |
| 59 | + You should now be able to access your secured storage account from the workspace. |
50 | 60 |
|
51 |
| -Learn more about [Managed workspace virtual network](./synapse-workspace-managed-vnet.md). |
| 61 | +## Related content |
52 | 62 |
|
53 |
| -Learn more about [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md). |
| 63 | +* [Azure Synapse Analytics Managed Virtual Network](./synapse-workspace-managed-vnet.md) |
| 64 | +* [Azure Synapse Analytics managed private endpoints](./synapse-workspace-managed-private-endpoints.md) |
0 commit comments