Skip to content

Commit 5afa8ed

Browse files
committed
Updating the doc for the new feaures added
1 parent ef4eda3 commit 5afa8ed

24 files changed

+375
-23
lines changed

articles/mariadb/concepts-data-access-security-private-link.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Private Link for Azure Database for MariaDB (Preview)
2+
title: Private Link for Azure Database for MariaDB
33
description: Learn how Private link works for Azure Database for MariaDB.
44
author: kummanish
55
ms.author: manishku
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 01/09/2020
8+
ms.date: 03/10/2020
99
---
1010

11-
# Private Link for Azure Database for MariaDB (Preview)
11+
# Private Link for Azure Database for MariaDB
1212

1313
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside your private Virtual Network (VNet). The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
1414

@@ -106,6 +106,17 @@ The following situations and outcomes are possible when you use Private Link in
106106

107107
* If you don't configure any public traffic or service endpoint and you create private endpoints, then the Azure Database for MariaDB is accessible only through the private endpoints. If you don't configure public traffic or a service endpoint, after all approved private endpoints are rejected or deleted, no traffic will be able to access the Azure Database for MariaDB.
108108

109+
## Deny public access for Azure Database for MariaDB
110+
111+
While Private Link allows access via private endpoint only, customer can use still use the public end points via [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-and-security-vnet.md) in such cases where they may need a mix of private and public connectivity. However, if you want to rely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints by setting the **Deny Public Network Access** configuration on the database server.
112+
113+
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO* clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and ‘VNet service endpoint rule
114+
115+
> [!Note]
116+
> This setting does not have any impact on the SSL and TLS configurations for your Azure Database for MariaDB.
117+
118+
To learn how to set the **Deny Public Network Access** for your Azure Database for MariaDB from Azure portal, refer to [How to configure Deny Public Network Access](howto-deny-public-network-access.md).
119+
109120
## Next steps
110121

111122
To learn more about Azure Database for MariaDB security features, see the following articles:

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ajlam
55
ms.author: andrela
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 12/02/2019
8+
ms.date: 03/10/2020
99
---
1010

1111
# SSL connectivity in Azure Database for MariaDB
@@ -20,6 +20,32 @@ Connection strings for various programming languages are shown in the Azure port
2020

2121
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2222

23+
# TLS connectivity in Azure Database for MariaDB
24+
25+
Azure Database for MariaDB supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
26+
27+
## TLS settings
28+
29+
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MariaDB. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
30+
31+
| Minimum TLS Setting | TLS Version supported |
32+
|:---------------------------------|-------------------------------------:|
33+
| TLSEnforcementDisabled (default) | No TLS required |
34+
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
35+
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
36+
| TLS1_2 | TLS version 1.2 and higher |
37+
38+
39+
For example, setting this Minimum TLS setting version to TLS 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2+. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
40+
41+
> [!Note]
42+
> Azure Database for MariaDB defaults to TLS being disabled for all new servers.
43+
>
44+
> Currently the TLS version supported for Azure Database for MariaDB are TLS 1.0, TLS 1.1, TLS 1.2.
45+
46+
To learn how to set the TLS setting for your Azure Database for MariaDB, refer to [How to configure TLS setting](howto-tls-configurations.md).
47+
2348
## Next steps
2449
- Learn more about [server firewall rules](concepts-firewall-rules.md)
2550
- Learn how to [configure SSL](howto-configure-ssl.md).
51+
- Learn how to [configure TLS](howto-tls-configurations.md).
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Deny Public Network Access in Azure Database for MariaDB using Azure portal
3+
description: Learn how to configure Deny Public Network Access using Azure portal for your Azure Database for MariaDB
4+
author: kummanish
5+
ms.author: manishku
6+
ms.service: mariadb
7+
ms.topic: conceptual
8+
ms.date: 03/10/2020
9+
---
10+
11+
# Deny Public Network Access in Azure Database for MariaDB using Azure portal
12+
13+
This article describes how you can configure an Azure Database for MariaDB server to deny all public configurations and allow only private endpoints to go through to enhance the network security.
14+
15+
## Prerequisites
16+
17+
To complete this how-to guide, you need:
18+
19+
* An [Azure Database for MariaDB](quickstart-create-MariaDB-server-database-using-azure-portal.md)
20+
21+
## Set Deny Public Network Access
22+
23+
Follow these steps to set MariaDB server Deny Public Network Access:
24+
25+
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
26+
27+
* On the MariaDB server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
28+
29+
* In the Deny Public Network Access, select **Yes** to enable deny public access for your MariaDB server.
30+
31+
![Azure Database for MariaDB Deny network access](./media/howto-deny-public-network-access/deny-public-network-access.PNG)
32+
33+
* Click **Save** to save the changes.
34+
35+
* A notification will confirm that connection security setting was successfully enabled.
36+
37+
![Azure Database for MariaDB Deny network access success](./media/howto-deny-public-network-access/deny-public-network-access-success.png)
38+
39+
## Next steps
40+
41+
Learn about [how to create alerts on metrics](howto-alert-on-metric.md).
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
title: TLS configuration in Azure Database for MariaDB using Azure portal
3+
description: Learn how to set TLS configuration using Azure portal for your Azure Database for MariaDB
4+
author: kummanish
5+
ms.author: manishku
6+
ms.service: mariadb
7+
ms.topic: conceptual
8+
ms.date: 03/10/2020
9+
---
10+
11+
# Configuring TLS settings in Azure Database for MariaDB using Azure portal
12+
13+
This article describes how you can configure an Azure Database for MariaDB server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security.
14+
15+
Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for MariaDB. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
16+
17+
## Prerequisites
18+
19+
To complete this how-to guide, you need:
20+
21+
* An [Azure Database for MariaDB](quickstart-create-mariaDB-server-database-using-azure-portal.md)
22+
23+
## Set TLS configurations for Azure Database for MariaDB
24+
25+
Follow these steps to set MariaDB server minimum TLS version:
26+
27+
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
28+
29+
* On the MariaDB server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
30+
31+
* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MariaDB server.
32+
33+
![Azure Database for MariaDB TLS configuration](./media/howto-tls-configurations/tls-configurations.png)
34+
35+
* Click **Save** to save the changes.
36+
37+
* A notification will confirm that connection security setting was successfully enabled.
38+
39+
![Azure Database for MariaDB TLS configuration success](./media/howto-tls-configurations/tls-configurations-success.png)
40+
41+
## Next steps
42+
43+
Learn about [how to create alerts on metrics](howto-alert-on-metric.md).
107 KB
Loading
92.3 KB
Loading
117 KB
Loading
105 KB
Loading

articles/mysql/concepts-data-access-security-private-link.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Private Link for Azure Database for MySQL (Preview)
2+
title: Private Link for Azure Database for MySQL
33
description: Learn how Private link works for Azure Database for MySQL.
44
author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 01/09/2020
8+
ms.date: 03/10/2020
99
---
1010

11-
# Private Link for Azure Database for MySQL (Preview)
11+
# Private Link for Azure Database for MySQL
1212

1313
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside your private Virtual Network (VNet). The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
1414

@@ -54,9 +54,6 @@ Private Endpoints are required to enable Private Link. This can be done using th
5454
### Approval Process
5555
Once the network admin creates the Private Endpoint (PE), the MySQL admin can manage the Private Endpoint Connection (PEC) to Azure Database for MySQL.
5656

57-
> [!NOTE]
58-
> Currently, Azure Database for MySQL only supports auto-approval for the private endpoint.
59-
6057
* Navigate to the Azure Database for MySQL server resource in the Azure portal.
6158
* Select the Private endpoint connections in the left pane
6259
* Shows a list of all Private Endpoint Connections (PECs)
@@ -105,6 +102,17 @@ The following situations and outcomes are possible when you use Private Link in
105102

106103
* If you don't configure any public traffic or service endpoint and you create private endpoints, then the Azure Database for MySQL is accessible only through the private endpoints. If you don't configure public traffic or a service endpoint, after all approved private endpoints are rejected or deleted, no traffic will be able to access the Azure Database for MySQL.
107104

105+
## Deny public access for Azure Database for MySQL
106+
107+
While Private Link allows access via private endpoint only, customer can use still use the public end points via [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-and-security-vnet.md) in such cases where they may need a mix of private and public connectivity. However, if you want to rely only on private endpoints for accessing their Azure Database for MySQL, you can disable setting all public endpoints by setting the **Deny Public Network Access** configuration on the database server.
108+
109+
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for MySQL. When this setting is set to *NO* clients can connect to your Azure Database for MySQL based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and ‘VNet service endpoint rule
110+
111+
> [!Note]
112+
> This setting does not have any impact on the SSL and TLS configurations for your Azure Database for MySQL.
113+
114+
To learn how to set the **Deny Public Network Access** for your Azure Database for MySQL from Azure portal, refer to [How to configure Deny Public Network Access](howto-deny-public-network-access.md).
115+
108116
## Next steps
109117

110118
To learn more about Azure Database for MySQL security features, see the following articles:

articles/mysql/concepts-ssl-connection-security.md

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,51 @@
11
---
22
title: SSL connectivity - Azure Database for MySQL
33
description: Information for configuring Azure Database for MySQL and associated applications to properly use SSL connections
4-
author: ajlam
5-
ms.author: andrela
4+
author: kummanish
5+
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 01/13/2020
8+
ms.date: 03/10/2020
99
---
1010

1111
# SSL connectivity in Azure Database for MySQL
1212

1313
Azure Database for MySQL supports connecting your database server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application.
1414

15-
## Default settings
15+
## SSL Default settings
1616

1717
By default, the database service should be configured to require SSL connections when connecting to MySQL. We recommend to avoid disabling the SSL option whenever possible.
1818

1919
When provisioning a new Azure Database for MySQL server through the Azure portal and CLI, enforcement of SSL connections is enabled by default.
2020

2121
Connection strings for various programming languages are shown in the Azure portal. Those connection strings include the required SSL parameters to connect to your database. In the Azure portal, select your server. Under the **Settings** heading, select the **Connection strings**. The SSL parameter varies based on the connector, for example "ssl=true" or "sslmode=require" or "sslmode=required" and other variations.
2222

23-
> [!NOTE]
23+
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
24+
25+
# TLS connectivity in Azure Database for MySQL
26+
27+
Azure Database for MySQL supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
28+
29+
## TLS settings
30+
31+
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MySQL. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
32+
33+
| Minimum TLS Setting | TLS Version supported |
34+
|:---------------------------------|-------------------------------------:|
35+
| TLSEnforcementDisabled (default) | No TLS required |
36+
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
37+
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
38+
| TLS1_2 | TLS version 1.2 and higher |
39+
40+
41+
For example, setting this Minimum TLS setting version to TLS 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2+. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
42+
43+
> [!Note]
44+
> Azure Database for MySQL defaults to TLS being disabled for all new servers.
45+
>
2446
> Currently the TLS version supported for Azure Database for MySQL are TLS 1.0, TLS 1.1, TLS 1.2.
2547
26-
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
48+
To learn how to set the TLS setting for your Azure Database for MySQL, refer to [How to configure TLS setting](howto-tls-configurations.md).
2749

2850
## Next steps
2951

0 commit comments

Comments
 (0)