Skip to content

Commit 4724747

Browse files
authored
Merge pull request #73374 from VanMSFT/MIPublicEndpoint2
Updating docs for MI Public Endpoint
2 parents 1b43cd0 + a0e89d1 commit 4724747

File tree

6 files changed

+55
-6
lines changed

6 files changed

+55
-6
lines changed
81.7 KB
Loading

articles/sql-database/sql-database-howto-managed-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ author: jovanpop-msft
1111
ms.author: jovanpop
1212
ms.reviewer: sstein, carlr
1313
manager: craigg
14-
ms.date: 01/25/2019
14+
ms.date: 04/16/2019
1515
---
1616
# How to use a managed instance in Azure SQL Database
1717

@@ -30,7 +30,7 @@ In this article you can find various guides, scripts, and explanation that can h
3030
- [Configure existing VNet and subnet for a managed instance](sql-database-managed-instance-configure-vnet-subnet.md) – if you want to configure your existing VNet and subnet to deploy managed instances inside, here you can find the script that checks the [network requirements](sql-database-managed-instance-connectivity-architecture.md#network-requirements) and make configures your subnet according to the requirements.
3131
- [Configure custom DNS](sql-database-managed-instance-custom-dns.md) – you need to configure custom DNS if you want to access external resources on the custom domains from your managed instance via linked server of db mail profiles.
3232
- [Sync network configuration](sql-database-managed-instance-sync-network-configuration.md) - It might happen that although you [integrated your app with an Azure Virtual Network](../app-service/web-sites-integrate-with-vnet.md), you can't establish connection to a managed instance. One thing you can try is to refresh networking configuration for your service plan.
33-
- [Find management endpoint IP address](sql-database-managed-instance-find-management-endpoint-ip-address.md) – Managed instance uses public endpoint for management-purposes only. You can determine IP address of the management endpoint using the script described here.
33+
- [Find management endpoint IP address](sql-database-managed-instance-find-management-endpoint-ip-address.md) – Managed instance uses public endpoint for management-purposes. You can determine IP address of the management endpoint using the script described here.
3434
- [Verify built-in firewall protection](sql-database-managed-instance-management-endpoint-verify-built-in-firewall.md) – Managed instance is protected with built-in firewall that allows the traffic only on necessary ports. You can check and verify the built-in firewall rules using the script described in this guide.
3535
- [Connect applications](sql-database-managed-instance-connect-app.md) – Managed instance is placed in your own private Azure VNet with private IP address. Learn about different patterns for connecting the applications to your managed instance.
3636

articles/sql-database/sql-database-managed-instance-connectivity-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ author: srdan-bozovic-msft
1111
ms.author: srbozovi
1212
ms.reviewer: sstein, bonova, carlrab
1313
manager: craigg
14-
ms.date: 02/26/2019
14+
ms.date: 04/16/2019
1515
---
1616

1717
# Connectivity architecture for a managed instance in Azure SQL Database
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Secure managed instance public endpoints - Azure SQL Database managed instance | Microsoft Docs
3+
description: "Securely use public endpoints in Azure with managed instance"
4+
services: sql-database
5+
ms.service: sql-database
6+
ms.subservice: security
7+
ms.custom:
8+
ms.topic: conceptual
9+
author: srdan-bozovic-msft
10+
ms.author: srbozovi
11+
ms.reviewer: vanto, carlrab
12+
manager: craigg
13+
ms.date: 04/16/2019
14+
---
15+
# Using Azure SQL Database managed instance securely with public endpoint
16+
17+
Azure SQL Database managed instance could be enabled to provide user connectivity over [public endpoint](../virtual-network/virtual-network-service-endpoints-overview.md). This article provides guidance how to make this configuration more secure.
18+
19+
## Scenarios
20+
21+
Managed instance provides private endpoint to enable connectivity from inside its virtual network. The default option is to provide maximum isolation. However, there are scenarios where a public endpoint connection is needed:
22+
23+
- Integration with multi-tenant only PaaS offerings.
24+
- Higher throughput of data exchange than using VPN.
25+
- Company policies prohibit PaaS inside corporate networks.
26+
27+
## Deploying managed instance for public Endpoint access
28+
29+
Although not mandatory, the common deployment model for a managed instance with public endpoint access is to create the instance in a dedicated isolated virtual network. In this configuration, the virtual network is used just for virtual cluster isolation. It's not relevant if the managed instance IP address space overlaps with a corporate network IP address space.
30+
31+
## Securing data in motion
32+
33+
Managed instance data traffic is always encrypted if the client driver supports encryption. Data between the managed instance and other Azure Virtual Machines or Azure services never leaves Azure's backbone. If there's a managed instance to an on-premises network connection, it's recommended to use Express Route with Microsoft peering. Express Route will help avoid moving data over public Internet (for managed instance private connectivity, only private peering can be used).
34+
35+
## Locking down inbound and outbound connectivity
36+
37+
The following diagram shows recommended security configurations.
38+
39+
![managed-instance-vnet.png](media/sql-database-managed-instance-public-endpoint-securely/managed-instance-vnet.png)
40+
41+
Managed Instance has a [dedicated public endpoint address](sql-database-managed-instance-find-management-endpoint-ip-address.md). This IP address should be set in the client side outbound firewall and Network Security Group rules to limit outbound connectivity.
42+
43+
To ensure traffic to the managed instance is coming from trusted sources, it’s recommended to connect from sources with well-known IP addresses. Limit the access to the managed instance public endpoint on port 3342 using a Network Security Group.
44+
45+
When clients need to initiate a connection from an on-premise network, make sure the originating address is translated to a well-known set of IPs. If that can't be achieved (for example, mobile workforce being a typical scenario), it's recommended to use [Point-to-site VPN connections and a private endpoint](sql-database-managed-instance-configure-p2s.md).
46+
47+
If connections are started from Azure, it's recommended that traffic comes from well-known assigned [VIP](../virtual-network/virtual-networks-reserved-public-ip.md) (for example, Virtual Machines). For ease of managing VIP addresses, customers might consider using [public IP address prefix](../virtual-network/public-ip-address-prefix.md).

articles/sql-database/sql-database-managed-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ author: bonova
1111
ms.author: bonova
1212
ms.reviewer: sstein, carlrab, vanto
1313
manager: craigg
14-
ms.date: 04/08/2019
14+
ms.date: 04/16/2019
1515
---
1616
# Use SQL Database advanced data security with virtual networks and near 100% compatibility
1717

@@ -120,7 +120,7 @@ The managed instance deployment option combines advanced security features provi
120120
A managed instance provides additional security isolation from other tenants in the Azure cloud. Security isolation includes:
121121

122122
- [Native virtual network implementation](sql-database-managed-instance-connectivity-architecture.md) and connectivity to your on-premises environment using Azure Express Route or VPN Gateway.
123-
- SQL endpoint is exposed only through a private IP address, allowing safe connectivity from private Azure or hybrid networks.
123+
- In a default deployment, SQL endpoint is exposed only through a private IP address, allowing safe connectivity from private Azure or hybrid networks.
124124
- Single-tenant with dedicated underlying infrastructure (compute, storage).
125125

126126
The following diagram outlines various connectivity options for your applications:

articles/sql-database/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@
102102
- name: Azure PowerShell
103103
href: sql-database-powershell-samples.md
104104
- name: Azure Resource Manager
105-
displayName: ARM template
105+
displayName: Resource Manager template
106106
href: sql-database-resource-manager-samples.md
107107
- name: Concepts
108108
items:
@@ -186,6 +186,8 @@
186186
href: sql-database-managed-instance-transact-sql-information.md
187187
- name: Time zone in Managed Instance
188188
href: sql-database-managed-instance-timezone.md
189+
- name: Secure public endpoints in managed instance
190+
href: sql-database-managed-instance-public-endpoint-securely.md
189191
- name: Platform as a Service
190192
items:
191193
- name: Platform as a Service overview

0 commit comments

Comments
 (0)