You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-create-api-sqlazure.md
+31-23Lines changed: 31 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ The following steps use the Azure portal, but with the appropriate Azure Logic A
108
108
109
109
1. In the [Azure portal](https://portal.azure.com), open your blank logic app workflow in the designer.
110
110
111
-
1. Find and select the [SQL Server trigger](/connectors/sql) that you want to use.
111
+
1. Find and select the [SQL Server trigger](/connectors/sql/#trigger) that you want to use.
112
112
113
113
1. On the designer, under the search box, select **Standard**.
114
114
@@ -122,9 +122,9 @@ The following steps use the Azure portal, but with the appropriate Azure Logic A
122
122
123
123
1. Provide the [information for your connection](#create-connection). When you're done, select **Create**.
124
124
125
-
1.After the trigger information box appears, specify the interval and frequency for how often the trigger checks the table.
125
+
1.Provide the information required by [your selected trigger](/connectors/sql/#triggers).
126
126
127
-
1.To add other properties available for this trigger, open the **Add new parameter** list and select those properties.
127
+
1.If any other properties are available for this trigger, open the **Add new parameter** list, and select those properties relevant to your scenario.
128
128
129
129
This trigger returns only one row from the selected table, and nothing else. To perform other tasks, continue by adding either a [SQL Server connector action](#add-sql-action) or another action that performs the next task that you want in your logic app workflow.
130
130
@@ -136,7 +136,7 @@ The following steps use the Azure portal, but with the appropriate Azure Logic A
136
136
137
137
1. In the [Azure portal](https://portal.azure.com), open your blank logic app workflow in the designer.
138
138
139
-
1. Find and select the SQL Server trigger that you want.
139
+
1. Find and select the SQL Server trigger that you want to use.
140
140
141
141
1. On the designer, select **Choose an operation**.
142
142
@@ -146,23 +146,35 @@ The following steps use the Azure portal, but with the appropriate Azure Logic A
146
146
147
147
***Azure** to view the [SQL Server managed connector triggers](/connectors/sql/#triggers)
148
148
149
-
This example continues with the SQL Server built-in connector.
150
-
151
149
1. In the search box, enter **sql server**.
152
150
153
151
1. From the triggers list, select the SQL trigger that you want.
154
152
155
-
This example continues with the trigger named **When a row is inserted**.
This example selects the built-in trigger named **When a row is inserted**.
156
+
157
+

This example selects the built-in trigger named **When a row is created**.
162
+
163
+

164
+
165
+
1. Provide the [information for your connection](#create-connection). When you're done, select **Create**.
166
+
167
+
1. Provide the information required by your selected [built-in trigger](/azure/logic-apps/connectors/built-in/reference/sql/#triggers) or [managed trigger](/connectors/sql/#triggers).
156
168
157
-
1. Provide the [information for your connection](#create-connection). When you're done, select **Create**.
169
+
The following example continues with the built-in trigger named **When a row is inserted**. From the **Table name** list, select the table that you want to use.
158
170
159
-
1. After the trigger information box appears, specify the interval and frequency for how often the trigger checks the table.
171
+

160
172
161
-
1.To add other properties available for this trigger, open the **Add new parameter** list and select those properties.
173
+
1.If any other properties are available for this trigger, open the **Add new parameter** list, and select those properties relevant to your scenario.
162
174
163
-
This trigger returns the row that you inserted in the selected table, and nothing else. To perform other tasks, continue by adding either another SQL Server action or another action that performs the next task that you want in your logic app workflow.
175
+
In this example, the **When a row is inserted** built-in trigger returns the row that you inserted in the selected table, and nothing else. To perform other tasks, continue by adding either another SQL Server action or another action that performs the next task that you want in your logic app workflow.
164
176
165
-
For example, to view the data in this row, you can add other actions that create a file that includes the fields from the returned row, and then send email alerts. To learn about other available actions for this connector, see the [SQL Server built-in connector reference](/azure/logic-apps/connectors/built-in/reference/sql/#triggers) or the [SQL Server managed connector reference](/connectors/sql/).
177
+
For example, to view the data in this row, you can add other actions that create a file that includes the fields from the returned row, and then send email alerts. To learn about other available actions for this connector, see the [SQL Server built-in connector reference](/azure/logic-apps/connectors/built-in/reference/sql/#actions) or the [SQL Server managed connector reference](/connectors/sql/#actions).
166
178
167
179
1. When you're done, save your workflow. On the designer toolbar, select **Save**.
168
180
@@ -186,7 +198,7 @@ In this example, the logic app workflow starts with the [Recurrence trigger](../
186
198
187
199
1. In the [Azure portal](https://portal.azure.com), open your logic app workflow in the designer.
188
200
189
-
1. Find and select the [SQL Server action](/connectors/sql) that you want to use.
201
+
1. Find and select the [SQL Server action](/connectors/sql/#actions) that you want to use.
190
202
191
203
This example continues with the action named **Get row**.
192
204
@@ -228,17 +240,13 @@ In this example, the logic app workflow starts with the [Recurrence trigger](../
228
240
229
241
1. Under the **Choose an operation** search box, select either of the following options:
230
242
231
-
***Built-in** to view the [SQL Server built-in connector actions](/azure/logic-apps/connectors/built-in/reference/sql/#actions) such as **Execute query**
232
-
233
-

234
-
235
-
***Azure** to view the [SQL Server managed connector actions](/connectors/sql/#actions) such as **Get row**
243
+
***Built-in** to view the [SQL Server built-in connector actions](/azure/logic-apps/connectors/built-in/reference/sql/#actions)
236
244
237
-

245
+
***Azure** to view the [SQL Server managed connector actions](/connectors/sql/#actions)
238
246
239
247
1. In the search box, enter **sql server**.
240
248
241
-
1. From the actions list, select the SQL Server action that you want.
249
+
1. From the actions list, select the SQL Server action that you want to use.
@@ -291,9 +299,9 @@ In the connection information box, complete the following steps:
291
299
292
300
| Authentication | Description |
293
301
|----------------|-------------|
294
-
|**Connection String**| - Supported only in Standard workflows with the SQL Server built-in connector. <br><br>- Requires the connection string to your SQL server and database. |
295
-
|**Logic Apps Managed Identity**| - Supported with the SQL Server managed connector and ISE-versioned connector. In Standard workflows, this authentication type is available for the SQL Server built-in connector, but the option is named **Managed identity** instead. <br><br>- Requires the following items: <br><br>--- A valid managed identity that's [enabled on your logic app resource](../logic-apps/create-managed-service-identity.md) and has access to your database. <br><br>--- **SQL DB Contributor** role access to the SQL Server resource <br><br>--- **Contributor** access to the resource group that includes the SQL Server resource. <br><br>For more information, see the following documentation: <br><br>- [Managed identity authentication for SQL Server connector](/connectors/sql/#managed-identity-authentication) <br>- [SQL - Server-Level Roles](/sql/relational-databases/security/authentication-access/server-level-roles)|
302
+
|**Connection string**| - Supported only in Standard workflows with the SQL Server built-in connector. <br><br>- Requires the connection string to your SQL server and database. |
296
303
|**Active Directory OAuth**| - Supported only in Standard workflows with the SQL Server built-in connector. For more information, see the following documentation: <br><br>- [Authentication for SQL Server connector](/connectors/sql/#authentication) <br>- [Enable Azure Active Directory Open Authentication (Azure AD OAuth)](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth) <br>- [Azure Active Directory Open Authentication](../logic-apps/logic-apps-securing-a-logic-app.md#azure-active-directory-oauth-authentication)|
304
+
|**Logic Apps Managed Identity**| - Supported with the SQL Server managed connector and ISE-versioned connector. In Standard workflows, this authentication type is available for the SQL Server built-in connector, but the option is named **Managed identity** instead. <br><br>- Requires the following items: <br><br>--- A valid managed identity that's [enabled on your logic app resource](../logic-apps/create-managed-service-identity.md) and has access to your database. <br><br>--- **SQL DB Contributor** role access to the SQL Server resource <br><br>--- **Contributor** access to the resource group that includes the SQL Server resource. <br><br>For more information, see the following documentation: <br><br>- [Managed identity authentication for SQL Server connector](/connectors/sql/#managed-identity-authentication) <br>- [SQL - Server-Level Roles](/sql/relational-databases/security/authentication-access/server-level-roles)|
297
305
|**Service principal (Azure AD application)**| - Supported with the SQL Server managed connector. <br><br>- Requires an Azure AD application and service principal. For more information, see [Create an Azure AD application and service principal that can access resources using the Azure portal](../active-directory/develop/howto-create-service-principal-portal.md). |
298
306
|[**Azure AD Integrated**](/azure/azure-sql/database/authentication-aad-overview)| - Supported with the SQL Server managed connector and ISE-versioned connector. <br><br>- Requires a valid managed identity in Azure Active Directory (Azure AD) that's [enabled on your logic app resource](../logic-apps/create-managed-service-identity.md) and has access to your database. For more information, see these topics: <br><br>- [Azure SQL Security Overview - Authentication](/azure/azure-sql/database/security-overview#authentication) <br>- [Authorize database access to Azure SQL - Authentication and authorization](/azure/azure-sql/database/logins-create-manage#authentication-and-authorization) <br>- [Azure SQL - Azure AD Integrated authentication](/azure/azure-sql/database/authentication-aad-overview)|
299
307
|[**SQL Server Authentication**](/sql/relational-databases/security/choose-an-authentication-mode#connecting-through-sql-server-authentication)| - Supported with the SQL Server managed connector and ISE-versioned connector. <br><br>- Requires the following items: <br><br>--- A data gateway resource that's previously created in Azure for your connection, regardless whether your logic app is in multi-tenant Azure Logic Apps or an ISE. <br><br>--- A valid user name and strong password that are created and stored in your SQL Server database. For more information, see the following topics: <br><br>- [Azure SQL Security Overview - Authentication](/azure/azure-sql/database/security-overview#authentication) <br>- [Authorize database access to Azure SQL - Authentication and authorization](/azure/azure-sql/database/logins-create-manage#authentication-and-authorization)|
@@ -349,7 +357,7 @@ In the connection information box, complete the following steps:
349
357
350
358
1. For connections to your on-premises SQL server that require the on-premises data gateway, make sure that you've [completed these prerequisites](#multi-tenant-or-ise).
351
359
352
-
Otherwise, your data gateway resource won't appear in the **Connection Gateway** list when you create your connection.
360
+
Otherwise, your data gateway resource doesn't appear in the **Connection Gateway** list when you create your connection.
353
361
354
362
1. For **Authentication Type**, select the authentication that's required and enabled on your SQL Server:
0 commit comments