Skip to content

Commit 448a715

Browse files
committed
Updating the doc for the new feaures added
1 parent 5afa8ed commit 448a715

8 files changed

+24
-24
lines changed

articles/mariadb/concepts-data-access-security-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ The following situations and outcomes are possible when you use Private Link in
108108

109109
## Deny public access for Azure Database for MariaDB
110110

111-
While Private Link allows access via private endpoint only, customer can use still use the public end points via [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-and-security-vnet.md) in such cases where they may need a mix of private and public connectivity. However, if you want to rely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints by setting the **Deny Public Network Access** configuration on the database server.
111+
While Private Link allows access via private endpoint only, customer can use still use the public end points via [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-security-vnet.md) in such cases where they may need a mix of private and public connectivity. However, if you want to rely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints by setting the **Deny Public Network Access** configuration on the database server.
112112

113113
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO* clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and ‘VNet service endpoint rule
114114

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ Connection strings for various programming languages are shown in the Azure port
2020

2121
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2222

23-
# TLS connectivity in Azure Database for MariaDB
23+
## TLS connectivity in Azure Database for MariaDB
2424

2525
Azure Database for MariaDB supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
2626

27-
## TLS settings
27+
### TLS settings
2828

2929
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MariaDB. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
3030

articles/mariadb/howto-deny-public-network-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,4 +38,4 @@ Follow these steps to set MariaDB server Deny Public Network Access:
3838

3939
## Next steps
4040

41-
Learn about [how to create alerts on metrics](howto-alert-on-metric.md).
41+
Learn about [how to create alerts on metrics](howto-alert-metric.md).

articles/mariadb/howto-tls-configurations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ Follow these steps to set MariaDB server minimum TLS version:
4040

4141
## Next steps
4242

43-
Learn about [how to create alerts on metrics](howto-alert-on-metric.md).
43+
Learn about [how to create alerts on metrics](howto-alert-metric.md).

articles/mysql/concepts-ssl-connection-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ Connection strings for various programming languages are shown in the Azure port
2222

2323
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2424

25-
# TLS connectivity in Azure Database for MySQL
25+
## TLS connectivity in Azure Database for MySQL
2626

2727
Azure Database for MySQL supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
2828

29-
## TLS settings
29+
### TLS settings
3030

3131
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MySQL. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
3232

articles/postgresql/concepts-ssl-connection-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,11 @@ psql "sslmode=verify-full sslrootcert=BaltimoreCyberTrustRoot.crt host=mydemoser
6060
> [!TIP]
6161
> Confirm that the value passed to `sslrootcert` matches the file path for the certificate you saved.
6262
63-
# TLS connectivity in Azure Database for PostgreSQL Single server
63+
## TLS connectivity in Azure Database for PostgreSQL Single server
6464

6565
Azure Database for PostgreSQL Single server supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
6666

67-
## TLS settings
67+
### TLS settings
6868

6969
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for PostgreSQL Single server. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
7070

articles/postgresql/howto-deny-public-network-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deny Public Network Access in Azure Database for PostgreSQL Single server
33
description: Learn how to configure Deny Public Network Access using Azure portal for your Azure Database for PostgreSQL Single server
44
author: kummanish
55
ms.author: manishku
6-
ms.service: PostgreSQL Single server
6+
ms.service: postgresql
77
ms.topic: conceptual
88
ms.date: 03/10/2020
99
---

articles/postgresql/howto-tls-configurations.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,42 @@
11
---
2-
title: TLS configuration in Azure Database for MySQL using Azure portal
3-
description: Learn how to set TLS configuration using Azure portal for your Azure Database for MySQL
2+
title: TLS configuration in Azure Database for PostgreSQL Single server using Azure portal
3+
description: Learn how to set TLS configuration using Azure portal for your Azure Database for PostgreSQL Single server
44
author: kummanish
55
ms.author: manishku
6-
ms.service: mysql
6+
ms.service: postgresql
77
ms.topic: conceptual
88
ms.date: 03/10/2020
99
---
1010

11-
# Configuring TLS settings in Azure Database for MySQL using Azure portal
11+
# Configuring TLS settings in Azure Database for PostgreSQL Single server using Azure portal
1212

13-
This article describes how you can configure an Azure Database for MySQL server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security.
13+
This article describes how you can configure an Azure Database for PostgreSQL Single server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security.
1414

15-
Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for MySQL. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
15+
Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for PostgreSQL Single server. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
1616

1717
## Prerequisites
1818

1919
To complete this how-to guide, you need:
2020

21-
* An [Azure Database for MySQL](quickstart-create-mysql-server-database-using-azure-portal.md)
21+
* An [Azure Database for PostgreSQL](quickstart-create-server-database-portal.md)
2222

23-
## Set TLS configurations for Azure Database for MySQL
23+
## Set TLS configurations for Azure Database for PostgreSQL Single server
2424

25-
Follow these steps to set MySQL server minimum TLS version:
25+
Follow these steps to set PostgreSQL Single server minimum TLS version:
2626

27-
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server.
27+
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for PostgreSQL Single server.
2828

29-
* On the MySQL server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
29+
* On the PostgreSQL Single server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
3030

31-
* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MySQL server.
31+
* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your PostgreSQL Single server.
3232

33-
![Azure Database for MySQL TLS configuration](./media/howto-tls-configurations/setting-tls-value.png)
33+
![Azure Database for PostgreSQL Single server TLS configuration](./media/howto-tls-configurations/setting-tls-value.png)
3434

3535
* Click **Save** to save the changes.
3636

3737
* A notification will confirm that connection security setting was successfully enabled.
3838

39-
![Azure Database for MySQL TLS configuration success](./media/howto-tls-configurations/setting-tls-value-success.png)
39+
![Azure Database for PostgreSQL Single server TLS configuration success](./media/howto-tls-configurations/setting-tls-value-success.png)
4040

4141
## Next steps
4242

0 commit comments

Comments
 (0)