Skip to content

Commit 796cebd

Browse files
authored
Merge pull request #267572 from WilliamDAssafMSFT/20240228-screenshots
20240228 edit pass, update screenshots
2 parents 8f5f755 + 8827a74 commit 796cebd

7 files changed

+25
-31
lines changed
Lines changed: 25 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
22
title: Azure Synapse connectivity settings
3-
description: An article that teaches you to configure connectivity settings in Azure Synapse Analytics
4-
ms.service: synapse-analytics
5-
ms.topic: overview
6-
ms.subservice: security
7-
ms.date: 03/29/2022
8-
author: danzhang-msft
9-
ms.author: danzhang
3+
description: Learn to configure connectivity settings in Azure Synapse Analytics.
4+
author: danzhang-msft
5+
ms.author: danzhang
106
ms.reviewer: wiassaf
7+
ms.date: 02/28/2024
8+
ms.service: synapse-analytics
9+
ms.subservice: security
10+
ms.topic: conceptual
1111
---
1212

1313
# Azure Synapse Analytics connectivity settings
1414

15-
This article will explain connectivity settings in Azure Synapse Analytics and how to configure them where applicable.
15+
This article explains connectivity settings in Azure Synapse Analytics and how to configure them where applicable.
1616

17-
## Public network access
17+
## Public network access
1818

1919
You can use the public network access feature to allow incoming public network connectivity to your Azure Synapse workspace.
2020

@@ -26,47 +26,41 @@ You can use the public network access feature to allow incoming public network c
2626
>
2727
> When the public network access is disabled, access to GIT mode in Synapse Studio and commit changes won't be blocked as long as the user has enough permission to access the integrated Git repo or the corresponding Git branch. However, the publish button won't work because the access to Live mode is blocked by the firewall settings.
2828
29-
Selecting the **Disable** option will not apply any firewall rules that you may configure. Additionally, your firewall rules will appear greyed out in the Network setting in Synapse portal. Your firewall configurations will be reapplied when you enable public network access again.
29+
Selecting the **Disable** option will not apply any firewall rules that you might configure. Additionally, your firewall rules will appear grayed out in the Network setting in Synapse portal. Your firewall configurations are reapplied when you enable public network access again.
3030

3131
> [!TIP]
3232
> When you revert to enable, allow some time before editing the firewall rules.
3333
3434
### Configure public network access when you create your workspace
3535

36-
1. Select the **Networking** tab when you create your workspace in [Azure portal](https://aka.ms/azureportal).
37-
2. Under Managed virtual network, select **Enable** to associate your workspace with managed virtual network and permit public network access.
36+
1. Select the **Networking** tab when you create your workspace in [Azure portal](https://aka.ms/azureportal).
37+
1. Under Managed virtual network, select **Enable** to associate your workspace with managed virtual network and permit public network access.
38+
1. Under **Public network access**, select **Disable** to deny public access to your workspace. Select **Enable** if you want to allow public access to your workspace.
3839

39-
:::image type="content" source="./media/connectivity-settings/create-synapse-workspace-managed-virtual-network-1.png" alt-text="Create Synapse workspace, networking tab, Managed virtual network setting" lightbox="media/connectivity-settings/create-synapse-workspace-managed-virtual-network-1.png":::
40+
:::image type="content" source="media/connectivity-settings/create-synapse-workspace-public-network-access.png" alt-text="Screenshot from the Azure portal. Create Synapse workspace, networking tab, public network access setting." lightbox="media/connectivity-settings/create-synapse-workspace-public-network-access.png":::
4041

41-
3. Under **Public network access**, select **Disable** to deny public access to your workspace. Select **Enable** if you want to allow public access to your workspace.
42-
43-
:::image type="content" source="./media/connectivity-settings/create-synapse-workspace-public-network-access-2.png" alt-text="Create Synapse workspace, networking tab, public network access setting" lightbox="media/connectivity-settings/create-synapse-workspace-public-network-access-2.png":::
44-
45-
4. Complete the rest of the workspace creation flow.
42+
1. Complete the rest of the workspace creation flow.
4643

4744
### Configure public network access after you create your workspace
4845

49-
1. Select your Synapse workspace in [Azure portal](https://aka.ms/azureportal).
50-
2. Select **Networking** from the left navigation.
51-
3. Select **Disabled** to deny public access to your workspace. Select **Enabled** if you want to allow public access to your workspace.
52-
53-
:::image type="content" source="./media/connectivity-settings/synapse-workspace-networking-public-network-access-3.png" alt-text="In an existing Synapse workspace, networking tab, public network access setting is enabled" lightbox="media/connectivity-settings/synapse-workspace-networking-public-network-access-3.png":::
46+
1. Select your Synapse workspace in [Azure portal](https://aka.ms/azureportal).
47+
1. Select **Networking** from the left navigation.
48+
1. Select **Disabled** to deny public access to your workspace. Select **Enabled** if you want to allow public access to your workspace.
5449

55-
4. When disabled, the **Firewall rules** gray out to indicate that firewall rules are not in effect. Firewall rule configurations will be retained.
50+
:::image type="content" source="media/connectivity-settings/synapse-workspace-networking-public-network-access.png" alt-text="Screenshot from the Azure portal. In an existing Synapse workspace, networking tab, public network access setting is enabled." lightbox="media/connectivity-settings/synapse-workspace-networking-public-network-access.png":::
5651

57-
:::image type="content" source="./media/connectivity-settings/synapse-workspace-networking-firewall-rules-4.png" alt-text="In an existing Synapse workspace, networking tab, public network access setting is disabled, attention to the firewall rules" lightbox="media/connectivity-settings/synapse-workspace-networking-firewall-rules-4.png":::
58-
59-
5. Select **Save** to save the change. A notification will confirm that the network setting was successfully saved.
52+
1. When disabled, the **Firewall rules** gray out to indicate that firewall rules are not in effect. Firewall rule configurations will be retained.
53+
1. Select **Save** to save the change. A notification will confirm that the network setting was successfully saved.
6054

6155
## Connection policy
62-
The connection policy for Synapse SQL in Azure Synapse Analytics is set to *Default*. You cannot change this in Azure Synapse Analytics. You can learn more about how that affects connections to Synapse SQL in Azure Synapse Analytics [here](/azure/azure-sql/database/connectivity-architecture#connection-policy).
56+
The connection policy for Synapse SQL in Azure Synapse Analytics is set to *Default*. You cannot change this in Azure Synapse Analytics. For more information, see [Connectivity architecture](/azure/azure-sql/database/connectivity-architecture#connection-policy).
6357

6458
## Minimal TLS version
6559
The serverless SQL endpoint and development endpoint only accept TLS 1.2 and above.
6660

67-
Starting in December 2021, a requirement for TLS 1.2 has been implemented for workspace-managed dedicated SQL pools in new Synapse workspaces. Login attempts from connections using a TLS version lower than 1.2 will fail. Customers can raise or lower the minimal TLS version using the API, for both new Synapse workspaces or existing workspaces, so users who need to use a lower client version in the workspaces can connect. Customers can also raise the minimum TLS version to meet their security needs. Learn more by reading [minimal TLS REST API](/rest/api/synapse/sqlserver/workspace-managed-sql-server-dedicated-sql-minimal-tls-settings/update).
61+
Since December 2021, a minimum level of TLS 1.2 is required for workspace-managed dedicated SQL pools in new Synapse workspaces. Sign-in attempts from connections using a TLS version lower than 1.2 fail. Customers can raise or lower this requirement using the [minimal TLS REST API](/rest/api/synapse/sqlserver/workspace-managed-sql-server-dedicated-sql-minimal-tls-settings/update) for both new Synapse workspaces or existing workspaces, so users who cannot use a higher TLS client version in the workspaces can connect. Customers can also raise the minimum TLS version to meet their security needs.
6862

63+
## Related content
6964

70-
## Next steps
65+
- [Azure Synapse Analytics IP firewall rules](synapse-workspace-ip-firewall.md)
7166

72-
- Create an [Azure Synapse Workspace](./synapse-workspace-ip-firewall.md).
66.6 KB
Loading
Loading

0 commit comments

Comments
 (0)