Skip to content

Commit 434d50f

Browse files
authored
Merge pull request #298474 from lrtoyou1223/shirbranch30
Add a note for trusted service
2 parents 1ca6dd9 + 92c4952 commit 434d50f

File tree

4 files changed

+29
-13
lines changed

4 files changed

+29
-13
lines changed

articles/data-factory/create-self-hosted-integration-runtime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ For some cloud databases, such as Azure SQL Database and Azure Data Lake, you mi
463463
464464

465465

466-
### Self-contained interactive authoring (preview)
466+
### Self-contained interactive authoring
467467
In order to perform interactive authoring actions such as data preview and connection testing, the self-hosted integration runtime requires a connection to Azure Relay. If the connection isn't established, there are two possible solutions to ensure uninterrupted functionality. The first option is to add the Azure Relay endpoints to your firewall's allowlist [Get URL of Azure Relay](#get-url-of-azure-relay). Alternatively, you can enable self-contained interactive authoring.
468468

469469
> [!NOTE]

articles/data-factory/data-access-strategies.md

Lines changed: 26 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,20 +21,35 @@ Typically a cloud data store controls access using the below mechanisms:
2121
* Authorization mechanisms that restrict users to specific actions and data
2222

2323
> [!TIP]
24-
> With the [introduction of Static IP address range](./azure-integration-runtime-ip-addresses.md), you can now allow list IP ranges for the particular Azure integration runtime region to ensure you don’t have to allow all Azure IP addresses in your cloud data stores. This way, you can restrict the IP addresses that are permitted to access the data stores.
24+
> With the [introduction of Static IP address range](./azure-integration-runtime-ip-addresses.md), you can now allowlist IP ranges for the particular Azure integration runtime region to ensure you don’t have to allow all Azure IP addresses in your cloud data stores. This way, you can restrict the IP addresses that are permitted to access the data stores.
2525
2626
> [!NOTE]
27-
> The IP address ranges are blocked for Azure Integration Runtime and is currently only used for Data Movement, pipeline and external activities. Dataflows and Azure Integration Runtime that enable Managed Virtual Network now do not use these IP ranges.
27+
> The IP address ranges are blocked for Azure Integration Runtime and are currently only used for Data Movement, pipeline and external activities. Dataflows and Azure Integration Runtime that enable Managed Virtual Network now don't use these IP ranges.
2828
2929
This should work in many scenarios, and we do understand that a unique Static IP address per integration runtime would be desirable, but this wouldn't be possible using Azure Integration Runtime currently, which is serverless. If necessary, you can always set up a Self-hosted Integration Runtime and use your Static IP with it.
3030

3131
## Data access strategies through Azure Data Factory
3232

33-
* **[Private Link](../private-link/private-link-overview.md)** - You can create an Azure Integration Runtime within Azure Data Factory Managed Virtual Network and it will leverage private endpoints to securely connect to supported data stores. Traffic between Managed Virtual Network and data sources travels the Microsoft backbone network and is not exposed to the public network.
34-
* **[Trusted Service](../storage/common/storage-network-security.md#exceptions)** - Azure Storage (Blob, ADLS Gen2) supports firewall configuration that enables select trusted Azure platform services to access the storage account securely. Trusted Services enforces Managed Identity authentication, which ensures no other data factory can connect to this storage unless approved to do so using it's managed identity. You can find more details in **[this blog](https://techcommunity.microsoft.com/t5/azure-data-factory/data-factory-is-now-a-trusted-service-in-azure-storage-and-azure/ba-p/964993)**. Hence, this is extremely secure and recommended.
35-
* **Unique Static IP** - You will need to set up a self-hosted integration runtime to get a Static IP for Data Factory connectors. This mechanism ensures you can block access from all other IP addresses.
36-
* **[Static IP range](./azure-integration-runtime-ip-addresses.md)** - You can use Azure Integration Runtime's IP addresses to allow list it in your storage (say S3, Salesforce, etc.). It certainly restricts IP addresses that can connect to the data stores but also relies on Authentication/ Authorization rules.
37-
* **[Service Tag](../virtual-network/service-tags-overview.md)** - A service tag represents a group of IP address prefixes from a given Azure service (like Azure Data Factory). Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules. It is useful when filtering data access on IaaS hosted data stores in Virtual Network.
33+
* **[Private Link](../private-link/private-link-overview.md)** - You can create an Azure Integration Runtime within Azure Data Factory Managed Virtual Network and it leverages private endpoints to securely connect to supported data stores. Traffic between Managed Virtual Network and data sources travels the Microsoft backbone network and isn't exposed to the public network.
34+
* **[Trusted Service](../storage/common/storage-network-security.md#exceptions)** - Azure Storage (Blob, ADLS Gen2) supports firewall configuration that enables select trusted Azure platform services to access the storage account securely. Trusted Services enforces Managed Identity authentication, which ensures no other data factory can connect to this storage unless approved to do so using it's managed identity.
35+
<!-- You can find more details in **[this blog](https://techcommunity.microsoft.com/t5/azure-data-factory/data-factory-is-now-a-trusted-service-in-azure-storage-and-azure/ba-p/964993)**. Hence, this is extremely secure and recommended. -->
36+
37+
> [!NOTE]
38+
> Below scenarios aren't in the trusted services list:
39+
> 1. Using a self-hosted integration runtime or SSIS integration runtime
40+
> 2. Using any of the following activity types:
41+
> - Webhook
42+
> - Custom
43+
> - Azure Function
44+
> 3. Using any of the following connectors:
45+
> - AzureBatch
46+
> - AzureFunction
47+
> - AzureFile
48+
> - OData
49+
50+
* **Unique Static IP** - You'll need to set up a self-hosted integration runtime to get a Static IP for Data Factory connectors. This mechanism ensures you can block access from all other IP addresses.
51+
* **[Static IP range](./azure-integration-runtime-ip-addresses.md)** - You can use Azure Integration Runtime's IP addresses to allowlist it in your storage (say S3, Salesforce, etc.). It certainly restricts IP addresses that can connect to the data stores but also relies on Authentication/ Authorization rules.
52+
* **[Service Tag](../virtual-network/service-tags-overview.md)** - A service tag represents a group of IP address prefixes from a given Azure service (like Azure Data Factory). Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules. It's useful when filtering data access on IaaS hosted data stores in Virtual Network.
3853
* **Allow Azure Services** - Some services lets you allow all Azure services to connect to it in case you choose this option.
3954

4055
For more information about supported network security mechanisms on data stores in Azure Integration Runtime and Self-hosted Integration Runtime, see below two tables.
@@ -67,12 +82,13 @@ For more information about supported network security mechanisms on data stores
6782
| | Azure Data Lake Gen1 | Yes | - |
6883
| | Azure Database for MariaDB, MySQL, PostgreSQL | Yes | - |
6984
| | Azure Files | Yes | - |
70-
| | Azure Blob storage and ADLS Gen2 | Yes | Yes (MSI auth only) |
85+
| | Azure Blob storage and ADLS Gen2 | Yes | - |
7186
| | Azure SQL DB, Azure Synapse Analytics), SQL Ml | Yes | - |
72-
| | Azure Key Vault (for fetching secrets/ connection string) | Yes | Yes |
87+
| | Azure Key Vault (for fetching secrets/ connection string) | Yes | - |
7388
| Other PaaS/ SaaS Data stores | AWS S3, SalesForce, Google Cloud Storage, etc. | Yes | - |
7489
| Azure laaS | SQL Server, Oracle, etc. | Yes | - |
75-
| On-premise laaS | SQL Server, Oracle, etc. | Yes | - |
90+
| On-premises laaS | SQL Server, Oracle, etc. | Yes | - |
91+
7692

7793
## Related content
7894

articles/data-factory/data-factory-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Enabling Private Link for each of the preceding communication channels offers th
5151
- The command communications between the self-hosted IR and Data Factory can be performed securely in a private network environment. The traffic between the self-hosted IR and Data Factory goes through Private Link.
5252
- **Not currently supported**:
5353
- Interactive authoring that uses a self-hosted IR, such as test connection, browse folder list and table list, get schema, and preview data, goes through Private Link.
54-
Please notice that the traffic goes through private link if the self-contained interactive authoring is enabled. See [Self-contained Interactive Authoring](create-self-hosted-integration-runtime.md#self-contained-interactive-authoring-preview).
54+
Please notice that the traffic goes through private link if the self-contained interactive authoring is enabled. See [Self-contained Interactive Authoring](create-self-hosted-integration-runtime.md#self-contained-interactive-authoring).
5555

5656
> [!NOTE]
5757
> Both "Get IP" and "Send log" are not supported when self-contained interactive authoring is enabled.

articles/data-factory/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Added support for metadata driven pipelines for dynamic full and incremental pro
4747

4848
### Integration runtime
4949

50-
Self-hosted integration runtime now supports self-contained interactive authoring (Preview) [Learn more](create-self-hosted-integration-runtime.md?tabs=data-factory#self-contained-interactive-authoring-preview)
50+
Self-hosted integration runtime now supports self-contained interactive authoring (Preview) [Learn more](create-self-hosted-integration-runtime.md?tabs=data-factory#self-contained-interactive-authoring)
5151

5252
## July 2023
5353

0 commit comments

Comments
 (0)