Skip to content

Commit 686b178

Browse files
committed
Updated table format
1 parent a6e49bd commit 686b178

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

articles/data-factory/data-access-strategies.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ author: nabhishek
77
ms.service: data-factory
88
ms.workload: data-services
99
ms.topic: conceptual
10-
ms.date: 05/08/2020
10+
ms.date: 05/11/2020
1111
---
1212

1313
# Data access strategies
1414

1515
A vital security goal of an organization is to protect their data stores from random access over the internet, may it be an on-premise or a Cloud/ SaaS data store.
1616

17-
Typically a cloud data store control access using the below mechanisms:
17+
Typically a cloud data store controls access using the below mechanisms:
1818
* Firewall rules that limit connectivity by IP address
1919
* Authentication mechanisms that require users to prove their identity
2020
* Authorization mechanisms that restrict users to specific actions and data
@@ -25,7 +25,7 @@ Typically a cloud data store control access using the below mechanisms:
2525
> [!NOTE]
2626
> The IP address ranges are blocked for Azure integration runtime and is currently only used for Data Movement, pipeline and external activities. Dataflows now do not use these IP ranges.
2727
28-
Though this should work in many scenarios, we do understand that a unique Static IP address per integration runtime would be desirable, but this wouldn't be possible using Azure Integration Runtime currently, which is serverless. If necessary, you can always set up a Self-hosted Integration Runtime and use your Static IP with it.
28+
This should work in many scenarios, and we do understand that a unique Static IP address per integration runtime would be desirable, but this wouldn't be possible using Azure Integration Runtime currently, which is serverless. If necessary, you can always set up a Self-hosted Integration Runtime and use your Static IP with it.
2929

3030
## Data access strategies through Azure Data Factory
3131

@@ -34,7 +34,9 @@ Though this should work in many scenarios, we do understand that a unique Static
3434
* **[Static IP range](https://docs.microsoft.com/azure/data-factory/azure-integration-runtime-ip-addresses)** - You can use Azure Integration Runtime's IP addresses to allow list it in your storage (say S3, Salesforce, etc.). It certainly restricts IP addresses that can connect to the data stores but also relies on Authentication/ Authorization rules.
3535
* **[Service Tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview)** - A service tag represents a group of IP address prefixes from a given Azure service (like Azure Data Factory). Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules. It is useful when whitelisting data access on IaaS hosted data stores in Virtual Network.
3636
* **Allow Azure Services** - Some services lets you allow all Azure services to connect to it in case you choose this option.
37-
* **Azure Integration Runtime**
37+
38+
For more information about supported network security mechanisms on data stores in Azure Integration Runtime and Self-hosted Integration Runtime, see below two tables.
39+
* **Azure Integration Runtime**
3840

3941
| Data Stores | Supported Network Security Mechanism on Data Stores | Trusted Service | Static IP range | Service Tags | Allow Azure Services |
4042
|------------------------------|-------------------------------------------------------------|---------------------|-----------------|--------------|----------------------|
@@ -49,10 +51,10 @@ Though this should work in many scenarios, we do understand that a unique Static
4951
| Other PaaS/ SaaS Data stores | AWS S3, SalesForce, Google Cloud Storage, etc. | - | Yes | - | - |
5052
| Azure laaS | SQL Server, Oracle, etc. | - | Yes | Yes | - |
5153
| On-premise laaS | SQL Server, Oracle, etc. | - | Yes | - | - |
52-
54+
5355
**Applicable only when Azure Data Explorer is virtual network injected, and IP range can be applied on NSG/ Firewall.*
5456

55-
* **Self-hosted Integration Runtime (in Vnet/on-premise)**
57+
* **Self-hosted Integration Runtime (in Vnet/on-premise)**
5658

5759
| Data Stores | Supported Network Security Mechanism on Data Stores | Static IP | Trusted Services |
5860
|--------------------------------|---------------------------------------------------------------|-----------|---------------------|
@@ -67,7 +69,7 @@ Though this should work in many scenarios, we do understand that a unique Static
6769
| Other PaaS/ SaaS Data stores | AWS S3, SalesForce, Google Cloud Storage, etc. | Yes | - |
6870
| Azure laaS | SQL Server, Oracle, etc. | Yes | - |
6971
| On-premise laaS | SQL Server, Oracle, etc. | Yes | - |
70-
72+
7173
## Next steps
7274

7375
For more information, see the following related articles:

0 commit comments

Comments
 (0)