Skip to content

Commit 81ba4f0

Browse files
authored
Merge pull request #191120 from WilliamDAssafMSFT/20220309-tde-cmk-uami-synapse
20220309 update UMI for synapse
2 parents 03c077e + 2b7c2ce commit 81ba4f0

File tree

1 file changed

+16
-11
lines changed

1 file changed

+16
-11
lines changed

articles/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,29 @@
11
---
22
title: User-assigned managed identity in Azure AD for Azure SQL
3-
description: This article provides information on user-assigned managed identities in Azure Active Directory (AD) with Azure SQL Database and Azure SQL Managed Instance
3+
description: User-assigned managed identities (UMI) in Azure AD (AD) for Azure SQL Database, SQL Managed Instance, and dedicated SQL pools in Azure Synapse Analytics.
44
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
55
ms.service: sql-db-mi
66
ms.subservice: security
77
ms.topic: conceptual
88
author: GithubMirek
99
ms.author: mireks
1010
ms.reviewer: vanto
11-
ms.date: 12/15/2021
11+
ms.date: 03/09/2022
1212
---
1313

1414
# User-assigned managed identity in Azure AD for Azure SQL
1515

16-
[!INCLUDE[appliesto-sqldb-sqlmi](../includes/appliesto-sqldb-sqlmi.md)]
16+
[!INCLUDE[appliesto-sqldb-sqlmi-asa-dedicated-only](../includes/appliesto-sqldb-sqlmi-asa-dedicated-only.md)]
1717

1818
> [!NOTE]
1919
> User-assigned managed identity for Azure SQL is in **public preview**.
2020
2121
Azure Active Directory (AD) supports two types of managed identities: System-assigned managed identity (SMI) and user-assigned managed identity (UMI). For more information, see [Managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types).
2222

23-
When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
23+
A system-assigned managed identity is automatically assigned to a managed instance when it is created. When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
2424

2525
> [!NOTE]
26-
> A system-assigned managed identity is automatically assigned to a managed instance when it is created.
27-
>
28-
> User-assigned managed identity is not supported for Azure Synapse Analytics.
26+
> This article applies only to dedicated SQL pools (formerly SQL DW) in standalone Azure SQL servers. For more information on user-assigned managed identities for dedicated pools in Azure Synapse workspaces, see [Using a user-assigned managed identity](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity).
2927
3028
## Benefits of using user-assigned managed identities
3129

@@ -55,9 +53,12 @@ Once the UMI is created, some permissions are needed to allow the UMI to read fr
5553
- [**GroupMember.Read.All**](/graph/permissions-reference#group-permissions) – allows access to Azure AD group information
5654
- [**Application.Read.ALL**](/graph/permissions-reference#application-resource-permissions) – allows access to Azure AD service principal (applications) information
5755

58-
### Granting permissions
56+
### Grant permissions
5957

60-
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI.
58+
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI. This sample will assign permissions to the UMI `umiservertest`. To execute the script, you must sign in as a user with a "Global Administrator" or "Privileged Role Administrator" role, and have the following [Microsoft Graph permissions](/graph/auth/auth-concepts#microsoft-graph-permissions):
59+
- User.Read.All
60+
- GroupMember.Read.All
61+
- Application.Read.ALL
6162

6263
```powershell
6364
# Script to assign permissions to the UMI "umiservertest"
@@ -108,6 +109,8 @@ $AAD_AppRole = $AAD_SP.AppRoles | Where-Object {$_.Value -eq "Application.Read.A
108109
New-AzureADServiceAppRoleAssignment -ObjectId $MSI.ObjectId -PrincipalId $MSI.ObjectId -ResourceId $AAD_SP.ObjectId[0] -Id $AAD_AppRole.Id
109110
```
110111

112+
In the final steps of the script, if you have more UMIs with similar names, you have to use the proper `$MSI[ ]array` number, for example, `$AAD_SP.ObjectId[0]`.
113+
111114
### Check permissions for user-assigned manage identity
112115

113116
To check permissions for a UMI, go to the [Azure portal](https://portal.azure.com). In the **Azure Active Directory** resource, go to **Enterprise applications**. Select **All Applications** for the **Application type**, and search for the UMI that was created.
@@ -178,7 +181,6 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
178181
179182
## Limitations and known issues
180183

181-
- This feature isn't supported for Azure Synapse Analytics.
182184
- After a Managed Instance is created, the **Active Directory admin** blade in the Azure portal shows a warning: `Managed Instance needs permissions to access Azure Active Directory. Click here to grant "Read" permissions to your Managed Instance.` If the user-assigned managed identity was given the appropriate permissions discussed in the above [Permissions](#permissions) section, this warning can be ignored.
183185
- If a system-assigned or user-assigned managed identity is used as the server or instance identity, deleting the identity will result in the server or instance inability to access Microsoft Graph. Azure AD authentication and other functions will fail. To restore Azure AD functionality, a new SMI or UMI must be assigned to the server with appropriate permissions.
184186
- Permissions to access Microsoft Graph using UMI or SMI can only be granted using PowerShell. These permissions can't be granted using the Azure portal.
@@ -189,4 +191,7 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
189191
> [Create an Azure SQL logical server using a user-assigned managed identity](authentication-azure-ad-user-assigned-managed-identity-create-server.md)
190192
191193
> [!div class="nextstepaction"]
192-
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
194+
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
195+
196+
> [!div class="nextstepaction"]
197+
> [Using a user-assigned managed identity in Azure Synapse workspaces](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity)

0 commit comments

Comments
 (0)