Skip to content

Commit 87602e6

Browse files
Merge pull request #245080 from inward-eye/patch-121
Update access-policies-prerequisites-arc-sql-server.md
2 parents 1340be9 + d3544da commit 87602e6

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/purview/includes/access-policies-prerequisites-arc-sql-server.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,16 @@ ms.author: vlrodrig
44
ms.service: purview
55
ms.subservice: purview-data-policies
66
ms.topic: include
7-
ms.date: 07/12/2023
7+
ms.date: 07/15/2023
88
ms.custom: references_regions
99
---
10-
- Get [SQL Server on-premises version 2022](https://www.microsoft.com/en-us/sql-server/sql-server-downloads) running on Windows and install it. You can try the free Developer edition.
11-
- [Register a list of resource providers](/azure/azure-arc/servers/prerequisites#azure-resource-providers) in the subscription you will use to onboard the SQL Server instance to Azure Arc
12-
- Configure your permissions and then onboard the [SQL Server instance with Azure Arc](/sql/sql-server/azure-arc/connect-with-installer).
13-
- Enable [Azure Active Directory authentication in SQL Server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial). For a simpler setup, follow [this article](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial#setting-up-azure-ad-admin-using-the-azure-portal).
10+
- Get [SQL Server on-premises version 2022](https://www.microsoft.com/en-us/sql-server/sql-server-downloads) running on Windows and install it. For this configuration, only version 2022 or more recent are supported. Only Windows based SQL Server is supported. You can try the free Developer edition.
11+
- Configure your [permissions](/azure/azure-arc/servers/prerequisites#required-permissions) and then [register a list of resource providers](/azure/azure-arc/servers/prerequisites#azure-resource-providers) in the subscription you will use to onboard the SQL Server instance to Azure Arc
12+
- Complete prerequisites and onboard the [Windows based SQL Server instance with Azure Arc](/sql/sql-server/azure-arc/connect-with-installer).
13+
- Enable [Azure Active Directory authentication in SQL Server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial). For a simpler setup, complete the [prerequisites](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial#preparation-before-setting-the-azure-ad-admin) and process outlined in [this article](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial#setting-up-azure-ad-admin-using-the-azure-portal).
14+
- Remember to [grant application permissions and granting admin consent](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial#grant-application-permissions)
15+
- Beyond configuring an Azure AD admin for the SQL Server instance, it is not necessary to set up other Azure AD logins or users. You will grant those users access by using Microsoft Purview policies.
16+
1417

1518
#### Region support
1619

@@ -23,11 +26,11 @@ Policy enforcement is available in all Microsoft Purview regions except:
2326
#### Security considerations for Azure Arc-enabled SQL Server
2427

2528
- The server admin can turn off the Microsoft Purview policy enforcement.
26-
- Azure Arc admin and server admin permissions provide the ability to change the Azure Resource Manager path of the server. Because mappings in Microsoft Purview use Resource Manager paths, this can lead to wrong policy enforcements.
29+
- Azure Arc admin and server admin permissions provide the ability to change the Azure Resource Manager path of the server. Because mappings in Microsoft Purview use Resource Manager paths, it can lead to wrong policy enforcements.
2730
- A SQL Server admin (database admin) can gain the power of a server admin and can tamper with the cached policies from Microsoft Purview.
2831
- The recommended configuration is to create a separate app registration for each SQL server instance. This configuration prevents the second SQL Server instance from reading the policies meant for the first SQL Server instance, in case a rogue admin in the second SQL Server instance tampers with the Resource Manager path.
2932

30-
#### Verify the pre-requisites
33+
#### Verify the prerequisites
3134

3235
1. Sign in to the Azure portal through [this link](https://portal.azure.com/#view/Microsoft_Azure_HybridCompute/AzureArcCenterBlade/~/overview)
3336

0 commit comments

Comments
 (0)