Skip to content

Commit 8827a74

Browse files
authored
Apply suggestions from code review
Fix spelling and hyphenation
1 parent 8d6b94c commit 8827a74

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/synapse-analytics/security/connectivity-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You can use the public network access feature to allow incoming public network c
2626
>
2727
> When the public network access is disabled, access to GIT mode in Synapse Studio and commit changes won't be blocked as long as the user has enough permission to access the integrated Git repo or the corresponding Git branch. However, the publish button won't work because the access to Live mode is blocked by the firewall settings.
2828
29-
Selecting the **Disable** option will not apply any firewall rules that you might configure. Additionally, your firewall rules will appear greyed out in the Network setting in Synapse portal. Your firewall configurations are reapplied when you enable public network access again.
29+
Selecting the **Disable** option will not apply any firewall rules that you might configure. Additionally, your firewall rules will appear grayed out in the Network setting in Synapse portal. Your firewall configurations are reapplied when you enable public network access again.
3030

3131
> [!TIP]
3232
> When you revert to enable, allow some time before editing the firewall rules.
@@ -58,7 +58,7 @@ The connection policy for Synapse SQL in Azure Synapse Analytics is set to *Defa
5858
## Minimal TLS version
5959
The serverless SQL endpoint and development endpoint only accept TLS 1.2 and above.
6060

61-
Since December 2021, a minimum level of TLS 1.2 is required for workspace-managed dedicated SQL pools in new Synapse workspaces. Sign in attempts from connections using a TLS version lower than 1.2 fail. Customers can raise or lower this requirement using the [minimal TLS REST API](/rest/api/synapse/sqlserver/workspace-managed-sql-server-dedicated-sql-minimal-tls-settings/update) for both new Synapse workspaces or existing workspaces, so users who cannot use a higher TLS client version in the workspaces can connect. Customers can also raise the minimum TLS version to meet their security needs.
61+
Since December 2021, a minimum level of TLS 1.2 is required for workspace-managed dedicated SQL pools in new Synapse workspaces. Sign-in attempts from connections using a TLS version lower than 1.2 fail. Customers can raise or lower this requirement using the [minimal TLS REST API](/rest/api/synapse/sqlserver/workspace-managed-sql-server-dedicated-sql-minimal-tls-settings/update) for both new Synapse workspaces or existing workspaces, so users who cannot use a higher TLS client version in the workspaces can connect. Customers can also raise the minimum TLS version to meet their security needs.
6262

6363
## Related content
6464

0 commit comments

Comments
 (0)