You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
33
33
-[Office 365 (preview)](#office-365-preview)
34
34
- Azure Analysis Services
35
35
- Azure DevOps
36
-
-[Azure SQL Database and Data Warehouse](../../sql-database/sql-database-conditional-access.md)
36
+
-[Azure SQL Database and Data Warehouse](../../azure-sql/database/conditional-access-confugre.md)
37
37
- Dynamics CRM Online
38
38
- Microsoft Application Insights Analytics
39
39
-[Microsoft Azure Information Protection](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
Copy file name to clipboardExpand all lines: articles/availability-zones/az-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,7 +161,7 @@ There is no additional cost for virtual machines deployed in an Availability Zon
161
161
-[Load balance VMs across zones using a Standard Load Balancer with a zone-redundant frontend](../load-balancer/load-balancer-standard-public-zone-redundant-cli.md)
162
162
-[Load balance VMs within a zone using a Standard Load Balancer with a zonal frontend](../load-balancer/load-balancer-standard-public-zonal-cli.md)
Copy file name to clipboardExpand all lines: articles/azure-sql/database/aad-authentication-configure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ For more information, see [Integrating your on-premises identities with Azure Ac
55
55
56
56
## Azure AD admin with a server in SQL Database
57
57
58
-
Each [server](logical-servers.md) in Azure (which hosts SQL Database or Azure Synapse) starts with a single server administrator account that is the administrator of the entire server. Create a second administrator account as an Azure AD account. This principal is created as a contained database user in the master database of the server. Administrator accounts are members of the **db_owner** role in every user database, and enter each user database as the **dbo** user. For more information about administrator accounts, see [Managing Databases and Logins](../../sql-database/sql-database-manage-logins.md).
58
+
Each [server](logical-servers.md) in Azure (which hosts SQL Database or Azure Synapse) starts with a single server administrator account that is the administrator of the entire server. Create a second administrator account as an Azure AD account. This principal is created as a contained database user in the master database of the server. Administrator accounts are members of the **db_owner** role in every user database, and enter each user database as the **dbo** user. For more information about administrator accounts, see [Managing Databases and Logins](logins-create-manage.md).
59
59
60
60
When using Azure Active Directory with geo-replication, the Azure Active Directory administrator must be configured for both the primary and the secondary servers. If a server does not have an Azure Active Directory administrator, then Azure Active Directory logins and users receive a `Cannot connect` to server error.
61
61
@@ -404,7 +404,7 @@ For more information about creating contained database users based on Azure Acti
404
404
> If you receive a **Connection Timeout Expired**, you may need to set the `TransparentNetworkIPResolution`
405
405
parameter of the connection string to false. For more information, see [Connection timeout issue with .NET Framework 4.6.1 - TransparentNetworkIPResolution](https://blogs.msdn.microsoft.com/dataaccesstechnologies/20../../connection-timeout-issue-with-net-framework-4-6-1-transparentnetworkipresolution/).
406
406
407
-
When you create a database user, that user receives the **CONNECT** permission and can connect to that database as a member of the **PUBLIC** role. Initially the only permissions available to the user are any permissions granted to the **PUBLIC** role, or any permissions granted to any Azure AD groups that they are a member of. Once you provision an Azure AD-based contained database user, you can grant the user additional permissions, the same way as you grant permission to any other type of user. Typically grant permissions to database roles, and add users to roles. For more information, see [Database Engine Permission Basics](https://social.technet.microsoft.com/wiki/contents/articles/4433.database-engine-permission-basics.aspx). For more information about special SQL Database roles, see [Managing Databases and Logins in Azure SQL Database](../../sql-database/sql-database-manage-logins.md).
407
+
When you create a database user, that user receives the **CONNECT** permission and can connect to that database as a member of the **PUBLIC** role. Initially the only permissions available to the user are any permissions granted to the **PUBLIC** role, or any permissions granted to any Azure AD groups that they are a member of. Once you provision an Azure AD-based contained database user, you can grant the user additional permissions, the same way as you grant permission to any other type of user. Typically grant permissions to database roles, and add users to roles. For more information, see [Database Engine Permission Basics](https://social.technet.microsoft.com/wiki/contents/articles/4433.database-engine-permission-basics.aspx). For more information about special SQL Database roles, see [Managing Databases and Logins in Azure SQL Database](logins-create-manage.md).
408
408
A federated domain user account that is imported into a managed domain as an external user, must use the managed domain identity.
409
409
410
410
> [!NOTE]
@@ -530,7 +530,7 @@ Guidance on troubleshooting issues with Azure AD Authentication can be found in
530
530
531
531
## Next steps
532
532
533
-
- For an overview of logins, users, database roles, and permissions in SQL Database, see [Logins, users, database roles, and user accounts](../../sql-database/sql-database-manage-logins.md).
533
+
- For an overview of logins, users, database roles, and permissions in SQL Database, see [Logins, users, database roles, and user accounts](logins-create-manage.md).
534
534
- For more information about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx).
535
535
- For more information about database roles, see [Database roles](https://msdn.microsoft.com/library/ms189121.aspx).
536
536
- For more information about firewall rules in SQL Database, see [SQL Database firewall rules](firewall-configure.md).
Copy file name to clipboardExpand all lines: articles/azure-sql/database/aad-authentication-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,7 +155,7 @@ The following authentication methods are supported for Azure AD server principal
155
155
156
156
- To learn how to create and populate Azure AD, and then configure Azure AD with Azure SQL Database, SQL Managed Instance or Azure Synapse, see [Configure and manage Azure Active Directory authentication with SQL Database, SQL Managed Instance, or Azure Synapse](aad-authentication-configure.md).
157
157
- For a tutorial of using Azure AD server principals (logins) with SQL Managed Instances, see [Azure AD server principals (logins) with SQL Managed Instances](../../sql-database/sql-database-managed-instance-aad-security-tutorial.md)
158
-
- For an overview of logins, users, database roles, and permissions in SQL Database, see [Logins, users, database roles, and permissions](../../sql-database/sql-database-manage-logins.md).
158
+
- For an overview of logins, users, database roles, and permissions in SQL Database, see [Logins, users, database roles, and permissions](logins-create-manage.md).
159
159
- For more information about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx).
160
160
- For more information about database roles, see [Database roles](https://msdn.microsoft.com/library/ms189121.aspx).
161
161
- For syntax on creating Azure AD server principals (logins) for SQL Managed Instances, see [CREATE LOGIN](/sql/t-sql/statements/create-login-transact-sql?view=azuresqldb-mi-current).
Copy file name to clipboardExpand all lines: articles/azure-sql/database/active-geo-replication-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ To achieve real business continuity, adding database redundancy between datacent
76
76
> [!NOTE]
77
77
> The log replay is delayed on the secondary database if there are schema updates on the Primary. The latter requires a schema lock on the secondary database.
78
78
> [!IMPORTANT]
79
-
> You can use geo-replication to create a secondary database in the same region as the primary. You can use this secondary to load-balance a read-only workloads in the same region. However, a secondary database in the same region does not provide additional fault resilience and therefore is not a suitable failover target for disaster recovery. It will also not guarantee availability zone isolation. Use Business critical or Premium service tier with [zone redundant configuration](../../sql-database/sql-database-high-availability.md#zone-redundant-configuration) to achieve availability zone isolation.
79
+
> You can use geo-replication to create a secondary database in the same region as the primary. You can use this secondary to load-balance a read-only workloads in the same region. However, a secondary database in the same region does not provide additional fault resilience and therefore is not a suitable failover target for disaster recovery. It will also not guarantee availability zone isolation. Use Business critical or Premium service tier with [zone redundant configuration](high-availability-sla.md#zone-redundant-configuration) to achieve availability zone isolation.
80
80
>
81
81
82
82
-**Planned failover**
@@ -113,7 +113,7 @@ To ensure that your application can immediately access the new primary after fai
113
113
114
114
Both primary and secondary databases are required to have the same service tier. It is also strongly recommended that the secondary database is created with the same compute size (DTUs or vCores) as the primary. If the primary database is experiencing a heavy write workload, a secondary with lower compute size may not be able to keep up with it. That will cause redo lag on the secondary, and potential unavailability of the secondary. To mitigate these risks, active geo-replication will throttle the primary's transaction log rate if necessary to allow its secondaries to catch up.
115
115
116
-
Another consequence of an imbalanced secondary configuration is that after failover, application performance may suffer due to insufficient compute capacity of the new primary. In that case, it will be necessary to scale up database service objective to the necessary level, which may take significant time and compute resources, and will require a [high availability](../../sql-database/sql-database-high-availability.md) failover at the end of the scale up process.
116
+
Another consequence of an imbalanced secondary configuration is that after failover, application performance may suffer due to insufficient compute capacity of the new primary. In that case, it will be necessary to scale up database service objective to the necessary level, which may take significant time and compute resources, and will require a [high availability](high-availability-sla.md) failover at the end of the scale up process.
117
117
118
118
If you decide to create the secondary with lower compute size, the log IO percentage chart in Azure portal provides a good way to estimate the minimal compute size of the secondary that is required to sustain the replication load. For example, if your primary database is P6 (1000 DTU) and its log write percent is 50%, the secondary needs to be at least P4 (500 DTU). To retrieve historical log IO data, use the [sys.resource_stats](/sql/relational-databases/system-catalog-views/sys-resource-stats-azure-sql-database) view. To retrieve recent log write data with higher granularity that better reflects short-term spikes in log rate, use [sys.dm_db_resource_stats](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-resource-stats-azure-sql-database) view.
119
119
@@ -198,7 +198,7 @@ After the initial setup, the users, logins, and firewall rules created can be re
198
198
199
199
## Keeping credentials and firewall rules in sync
200
200
201
-
We recommend using [database-level IP firewall rules](firewall-configure.md) for geo-replicated databases so these rules can be replicated with the database to ensure all secondary databases have the same IP firewall rules as the primary. This approach eliminates the need for customers to manually configure and maintain firewall rules on servers hosting both the primary and secondary databases. Similarly, using [contained database users](../../sql-database/sql-database-manage-logins.md) for data access ensures both primary and secondary databases always have the same user credentials so during a failover, there is no disruptions due to mismatches with logins and passwords. With the addition of [Azure Active Directory](../../active-directory/fundamentals/active-directory-whatis.md), customers can manage user access to both primary and secondary databases and eliminating the need for managing credentials in databases altogether.
201
+
We recommend using [database-level IP firewall rules](firewall-configure.md) for geo-replicated databases so these rules can be replicated with the database to ensure all secondary databases have the same IP firewall rules as the primary. This approach eliminates the need for customers to manually configure and maintain firewall rules on servers hosting both the primary and secondary databases. Similarly, using [contained database users](logins-create-manage.md) for data access ensures both primary and secondary databases always have the same user credentials so during a failover, there is no disruptions due to mismatches with logins and passwords. With the addition of [Azure Active Directory](../../active-directory/fundamentals/active-directory-whatis.md), customers can manage user access to both primary and secondary databases and eliminating the need for managing credentials in databases altogether.
Copy file name to clipboardExpand all lines: articles/azure-sql/database/advanced-data-security.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Advanced data security (ADS) is a unified package for advanced SQL security capa
21
21
22
22
Advanced data security (ADS) provides a set of advanced SQL security capabilities, including data discovery & classification, vulnerability assessment, and Advanced Threat Protection.
23
23
24
-
-[Data Discovery & Classification](../../sql-database/sql-database-data-discovery-and-classification.md) provides capabilities built into Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse for discovering, classifying, labeling & reporting the sensitive data in your databases. It can be used to provide visibility into your database classification state, and to track the access to sensitive data within the database and beyond its borders.
24
+
-[Data Discovery & Classification](data-discovery-and-classification-overview.md) provides capabilities built into Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse for discovering, classifying, labeling & reporting the sensitive data in your databases. It can be used to provide visibility into your database classification state, and to track the access to sensitive data within the database and beyond its borders.
25
25
-[Vulnerability Assessment](../../sql-database/sql-vulnerability-assessment.md) is an easy to configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and includes actionable steps to resolve security issues, and enhance your database fortifications.
26
26
-[Advanced Threat Protection](../../sql-database/sql-database-threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and provides immediate security alerts on potential vulnerabilities, SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
27
27
@@ -69,7 +69,7 @@ Advanced data security settings for your server or managed instance can also be
69
69
70
70
## Next steps
71
71
72
-
- Learn more about [Data Discovery & Classification](../../sql-database/sql-database-data-discovery-and-classification.md)
72
+
- Learn more about [Data Discovery & Classification](data-discovery-and-classification-overview.md)
73
73
- Learn more about [vulnerability Assessment](../../sql-database/sql-vulnerability-assessment.md)
74
74
- Learn more about [Advanced Threat Protection](../../sql-database/sql-database-threat-detection.md)
75
75
- Learn more about [Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-intro)
Copy file name to clipboardExpand all lines: articles/azure-sql/database/audit-log-format.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Audit events are written to Log Analytics workspace defined during auditing conf
50
50
| class_type_desc | class_type_description_s | Description of auditable entity that the audit occurs on | N/A | string |
51
51
| client_ip | client_ip_s | Source IP of the client application | nvarchar(128) | string |
52
52
| connection_id | N/A | ID of the connection in the server | GUID | N/A |
53
-
| data_sensitivity_information | data_sensitivity_information_s | Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](../../sql-database/sql-database-data-discovery-and-classification.md)| nvarchar(4000) | string |
53
+
| data_sensitivity_information | data_sensitivity_information_s | Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](data-discovery-and-classification-overview.md)| nvarchar(4000) | string |
54
54
| database_name | database_name_s | The database context in which the action occurred | sysname | string |
55
55
| database_principal_id | database_principal_id_d | ID of the database user context that the action is performed in | int | int |
56
56
| database_principal_name | database_principal_name_s | Name of the database user context in which the action is performed | sysname | string |
0 commit comments