You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| type | The type property must be set to **AzureSqlDW**. | Yes |
89
89
| connectionString | Specify the information needed to connect to the Azure Synapse Analytics instance for the **connectionString** property. <br/>Mark this field as a SecureString to store it securely. You can also put password/service principal key in Azure Key Vault,and if it's SQL authentication pull the `password` configuration out of the connection string. See the JSON example below the table and [Store credentials in Azure Key Vault](store-credentials-in-key-vault.md) article with more details. | Yes |
90
-
| servicePrincipalId | Specify the application's client ID. | Yes, when you use Azure AD authentication with a service principal. |
91
-
| servicePrincipalKey | Specify the application's key. Mark this field as a SecureString to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes, when you use Azure AD authentication with a service principal. |
92
-
| tenant | Specify the tenant information (domain name or tenant ID) under which your application resides. You can retrieve it by hovering the mouse in the top-right corner of the Azure portal. | Yes, when you use Azure AD authentication with a service principal. |
93
90
| azureCloudType | For service principal authentication, specify the type of Azure cloud environment to which your Azure AD application is registered. <br/> Allowed values are `AzurePublic`, `AzureChina`, `AzureUsGovernment`, and `AzureGermany`. By default, the data factory or Synapse pipeline's cloud environment is used. | No |
94
-
| credentials | Specify the user-assigned managed identity as the credential object. | Yes, when you use user-assigned managed identity authentication. |
95
91
| connectVia | The [integration runtime](concepts-integration-runtime.md) to be used to connect to the data store. You can use Azure Integration Runtime or a self-hosted integration runtime (if your data store is located in a private network). If not specified, it uses the default Azure Integration Runtime. | No |
96
92
97
-
For different authentication types, refer to the following sections on prerequisites and JSON samples, respectively:
93
+
For different authentication types, refer to the following sections on specific properties, prerequisites and JSON samples, respectively:
98
94
99
95
-[SQL authentication](#sql-authentication)
100
96
-[Service principal authentication](#service-principal-authentication)
@@ -109,6 +105,8 @@ For different authentication types, refer to the following sections on prerequis
109
105
110
106
### SQL authentication
111
107
108
+
To use SQL authentication authentication type, specify the generic properties that are described in the preceding section.
109
+
112
110
#### Linked service example that uses SQL authentication
113
111
114
112
```json
@@ -155,7 +153,15 @@ For different authentication types, refer to the following sections on prerequis
155
153
156
154
### Service principal authentication
157
155
158
-
To use service principal-based Azure AD application token authentication, follow these steps:
156
+
To use service principal authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
| servicePrincipalKey | Specify the application's key. Mark this field as a SecureString to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
162
+
| tenant | Specify the tenant information (domain name or tenant ID) under which your application resides. You can retrieve it by hovering the mouse in the top-right corner of the Azure portal. | Yes |
163
+
164
+
You also need to follow the steps below:
159
165
160
166
1.**[Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal)** from the Azure portal. Make note of the application name and the following values that define the linked service:
161
167
@@ -207,7 +213,7 @@ To use service principal-based Azure AD application token authentication, follow
207
213
208
214
A data factory or Synapse workspace can be associated with a [system-assigned managed identity for Azure resources](data-factory-service-identity.md#system-assigned-managed-identity) that represents the resource. You can use this managed identity for Azure Synapse Analytics authentication. The designated resource can access and copy data from or to your data warehouse by using this identity.
209
215
210
-
To use system-assigned managed identity authentication, follow these steps:
216
+
To use system-assigned managed identity authentication, specify the generic properties that are described in the preceding section, andfollow these steps.
211
217
212
218
1. **[Provision an Azure Active Directory administrator](/azure/azure-sql/database/authentication-aad-configure#provision-azure-ad-admin-sql-database)** for your server on the Azure portal if you haven't already done so. The Azure AD administrator can be an Azure AD user or Azure AD group. If you grant the group with system-assigned managed identity an admin role, skip steps 3 and 4. The administrator will have full access to the database.
213
219
@@ -246,7 +252,13 @@ To use system-assigned managed identity authentication, follow these steps:
246
252
247
253
A data factory or Synapse workspace can be associated with a [user-assigned managed identities](data-factory-service-identity.md#user-assigned-managed-identity) that represents the resource. You can use this managed identity for Azure Synapse Analytics authentication. The designated resource can access and copy data from or to your data warehouse by using this identity.
248
254
249
-
To use user-assigned managed identity authentication, follow these steps:
255
+
To use user-assigned managed identity authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
| credentials | Specify the user-assigned managed identity as the credential object. | Yes |
260
+
261
+
You also need to follow the steps below:
250
262
251
263
1. **[Provision an Azure Active Directory administrator](/azure/azure-sql/database/authentication-aad-configure#provision-azure-ad-admin-sql-database)** for your server on the Azure portal if you haven't already done so. The Azure AD administrator can be an Azure AD user or Azure AD group. If you grant the group with user-assigned managed identity an admin role, skip steps 3. The administrator will have full access to the database.
Copy file name to clipboardExpand all lines: articles/data-factory/connector-azure-sql-database.md
+22-10Lines changed: 22 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: data-factory
8
8
ms.subservice: data-movement
9
9
ms.topic: conceptual
10
10
ms.custom: synapse
11
-
ms.date: 07/04/2022
11
+
ms.date: 08/10/2022
12
12
---
13
13
14
14
# Copy and transform data in Azure SQL Database by using Azure Data Factory or Azure Synapse Analytics
@@ -84,21 +84,17 @@ The following sections provide details about properties that are used to define
84
84
85
85
## Linked service properties
86
86
87
-
These properties are supported for an Azure SQL Database linked service:
87
+
These generic properties are supported for an Azure SQL Database linked service:
88
88
89
89
| Property | Description | Required |
90
90
|:--- |:--- |:--- |
91
91
| type | The **type** property must be set to **AzureSqlDatabase**. | Yes |
92
92
| connectionString | Specify information needed to connect to the Azure SQL Database instance for the **connectionString** property. <br/>You also can put a password or service principal key in Azure Key Vault. If it's SQL authentication, pull the `password` configuration out of the connection string. For more information, see the JSON example following the table and [Store credentials in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
93
-
| servicePrincipalId | Specify the application's client ID. | Yes, when you use Azure AD authentication with a service principal |
94
-
| servicePrincipalKey | Specify the application's key. Mark this field as **SecureString** to store it securely or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes, when you use Azure AD authentication with a service principal |
95
-
| tenant | Specify the tenant information, like the domain name or tenant ID, under which your application resides. Retrieve it by hovering the mouse in the upper-right corner of the Azure portal. | Yes, when you use Azure AD authentication with a service principal |
96
93
| azureCloudType | For service principal authentication, specify the type of Azure cloud environment to which your Azure AD application is registered. <br/> Allowed values are **AzurePublic**, **AzureChina**, **AzureUsGovernment**, and **AzureGermany**. By default, the data factory or Synapse pipeline's cloud environment is used. | No |
97
94
| alwaysEncryptedSettings | Specify **alwaysencryptedsettings** information that's needed to enable Always Encrypted to protect sensitive data stored in SQL server by using either managed identity or service principal. For more information, see the JSON example following the table and [Using Always Encrypted](#using-always-encrypted) section. If not specified, the default always encrypted setting is disabled. |No |
98
-
| credentials | Specify the user-assigned managed identity as the credential object. | Yes, when you use user-assigned managed identity authentication |
99
95
| connectVia | This [integration runtime](concepts-integration-runtime.md) is used to connect to the data store. You can use the Azure integration runtime or a self-hosted integration runtime if your data store is located in a private network. If not specified, the default Azure integration runtime is used. | No |
100
96
101
-
For different authentication types, refer to the following sections on prerequisites and JSON samples, respectively:
97
+
For different authentication types, refer to the following sections on specific properties, prerequisites and JSON samples, respectively:
102
98
103
99
-[SQL authentication](#sql-authentication)
104
100
-[Service principal authentication](#service-principal-authentication)
@@ -110,6 +106,8 @@ For different authentication types, refer to the following sections on prerequis
110
106
111
107
### SQL authentication
112
108
109
+
To use SQL authentication authentication type, specify the generic properties that are described in the preceding section.
110
+
113
111
**Example: using SQL authentication**
114
112
115
113
```json
@@ -182,7 +180,15 @@ For different authentication types, refer to the following sections on prerequis
182
180
183
181
### Service principal authentication
184
182
185
-
To use a service principal-based Azure AD application token authentication, follow these steps:
183
+
To use service principal authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
| servicePrincipalKey | Specify the application's key. Mark this field as **SecureString** to store it securely or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
189
+
| tenant | Specify the tenant information, like the domain name or tenant ID, under which your application resides. Retrieve it by hovering the mouse in the upper-right corner of the Azure portal.| Yes |
190
+
191
+
You also need to follow the steps below:
186
192
187
193
1.[Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal) from the Azure portal. Make note of the application name and the following values that define the linked service:
188
194
@@ -234,7 +240,7 @@ To use a service principal-based Azure AD application token authentication, foll
234
240
235
241
A data factory or Synapse workspace can be associated with a [system-assigned managed identity for Azure resources](data-factory-service-identity.md#system-assigned-managed-identity) that represents the service when authenticating to other resources in Azure. You can use this managed identity for Azure SQL Database authentication. The designated factory or Synapse workspace can access and copy data from or to your database by using this identity.
236
242
237
-
To use system-assigned managed identity authentication, follow these steps.
243
+
To use system-assigned managed identity authentication, specify the generic properties that are described in the preceding section, andfollow these steps.
238
244
239
245
1. [Provision an Azure Active Directory administrator](/azure/azure-sql/database/authentication-aad-configure#provision-azure-ad-admin-sql-database) for your server on the Azure portal if you haven't already done so. The Azure AD administrator can be an Azure AD user or an Azure AD group. If you grant the group with managed identity an admin role, skip steps 3 and 4. The administrator has full access to the database.
240
246
@@ -274,7 +280,13 @@ To use system-assigned managed identity authentication, follow these steps.
274
280
275
281
A data factory or Synapse workspace can be associated with a [user-assigned managed identities](data-factory-service-identity.md#user-assigned-managed-identity) that represents the service when authenticating to other resources in Azure. You can use this managed identity for Azure SQL Database authentication. The designated factory or Synapse workspace can access and copy data from or to your database by using this identity.
276
282
277
-
To use user-assigned managed identity authentication, follow these steps.
283
+
To use user-assigned managed identity authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
284
+
285
+
| Property | Description | Required |
286
+
|:--- |:--- |:--- |
287
+
| credentials | Specify the user-assigned managed identity as the credential object. | Yes |
288
+
289
+
You also need to follow the steps below:
278
290
279
291
1. [Provision an Azure Active Directory administrator](/azure/azure-sql/database/authentication-aad-configure#provision-azure-ad-admin-sql-database) for your server on the Azure portal if you haven't already done so. The Azure AD administrator can be an Azure AD user or an Azure AD group. If you grant the group with user-assigned managed identity an admin role, skip steps 3. The administrator has full access to the database.
0 commit comments