Skip to content

Commit 99209af

Browse files
committed
updates from Nandita
1 parent b9fd8e4 commit 99209af

5 files changed

+20
-23
lines changed

articles/sql-database/sql-database-firewall-configure.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,29 @@
11
---
22
title: IP firewall rules
3-
description: Configure server-level IP firewall rules for a SQL database or SQL Data Warehouse firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
3+
description: Configure server-level IP firewall rules for a SQL database or Azure Synapse Analytics firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
titleSuffix: Azure SQL Database and SQL Data Warehouse
8-
ms.custom:
7+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
98
ms.devlang:
109
ms.topic: conceptual
1110
author: VanMSFT
1211
ms.author: vanto
1312
ms.reviewer: carlrab
1413
ms.date: 03/18/2019
1514
---
16-
# Azure SQL Database and Azure SQL Data Warehouse IP firewall rules
15+
# Azure SQL Database and Azure Synapse Analytics IP firewall rules
1716

1817
> [!NOTE]
19-
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure SQL Data Warehouse databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and SQL Data Warehouse.
18+
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure Synapse Analytics databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and Azure Synapse.
2019
2120
> [!IMPORTANT]
2221
> This article does *not* apply to *Azure SQL Database Managed Instance*. For information about network configuration, see [Connect your application to Azure SQL Database Managed Instance](sql-database-managed-instance-connect-app.md).
2322
2423
When you create a new Azure SQL server named *mysqlserver*, for example, the SQL Database firewall blocks all access to the public endpoint for the server (which is accessible at *mysqlserver.database.windows.net*).
2524

2625
> [!IMPORTANT]
27-
> SQL Data Warehouse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
26+
> Azure Synapse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
2827
2928
## How the firewall works
3029
Connection attempts from the internet and Azure must pass through the firewall before they reach your SQL server or SQL database, as the following diagram shows.
@@ -247,7 +246,7 @@ Consider the following points when access to the SQL Database service doesn't be
247246

248247
- **The login isn't authorized, or an incorrect password was used:**
249248

250-
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and SQL Data Warehouse](sql-database-manage-logins.md).
249+
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and Azure Synapse](sql-database-manage-logins.md).
251250

252251
- **Dynamic IP address:**
253252

articles/sql-database/sql-database-networkaccess-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.date: 03/09/2020
2424
2525
When you create a new Azure SQL Server from the [Azure portal](sql-database-single-database-get-started.md), the result is a public endpoint in the format, *yourservername.database.windows.net*.
2626

27-
You can use the following network access controls to selectively allow access to the SQl Database via the public endpoint:
27+
You can use the following network access controls to selectively allow access to the SQL Database via the public endpoint:
2828
- Allow Azure Services: When set to ON, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
2929

3030
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
@@ -51,7 +51,7 @@ You can also change this setting via the firewall pane after the Azure SQL Serve
5151

5252
When set to **ON** Azure SQL Server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
5353

54-
In many cases, the **ON** setting is more permissive than what most customers want.They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
54+
In many cases, the **ON** setting is more permissive than what most customers want.They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to SQL Database via an Azure IP address.
5555

5656
### Import Export Service
5757
Import Export Service does not work **Allow Azure services to access server** set to OFF. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
@@ -60,7 +60,7 @@ Import Export Service does not work **Allow Azure services to access server** s
6060
To use the Data sync feature with **Allow Azure services to access server** set to OFF, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
6161
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
6262

63-
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region
63+
Use the following PowerShell script to generate the IP addresses corresponding to SQL service tag for West US region
6464
```powershell
6565
PS C:\> $serviceTags = Get-AzNetworkServiceTag -Location eastus2
6666
PS C:\> $sql = $serviceTags.Values | Where-Object { $_.Name -eq "Sql.WestUS" }
@@ -76,7 +76,7 @@ PS C:\> $sql.Properties.AddressPrefixes
7676
```
7777

7878
> [!TIP]
79-
> Get-AzNetworkServiceTag returns the global range for Sql Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
79+
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
8080
8181
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation and this needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this
8282
```powershell

articles/sql-database/sql-database-private-endpoint-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -173,8 +173,6 @@ To establish connectivity from an on-premises environment to the SQL Database, c
173173

174174
PolyBase is commonly used to load data into Azure Synapse Analytics from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure Synapse Analytics connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
175175

176-
177-
178176
## Next steps
179177

180178
- For an overview of Azure SQL Database security, see [Securing your database](sql-database-security-overview.md)

articles/sql-database/sql-database-ssms-mfa-authentication-configure.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure multi-factor authentication
3-
description: Learn how to use Multi-Factored Authentication with SSMS for SQL Database and SQL Data Warehouse.
3+
description: Learn how to use Multi-Factored Authentication with SSMS for SQL Database and Azure Synapse Aalytics
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
@@ -14,33 +14,33 @@ ms.date: 08/27/2019
1414
---
1515
# Configure multi-factor authentication for SQL Server Management Studio and Azure AD
1616

17-
This topic shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to Azure [SQL Database](sql-database-technical-overview.md) and [SQL Data Warehouse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md). For an overview of Azure SQL Database multi-factor authentication, see [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
17+
This topic shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md). For an overview of Azure SQL Database multi-factor authentication, see [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
1818

1919
> [!NOTE]
20-
> This topic applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
20+
> This topic applies to Azure SQL server, and to both SQL Database and Azure Synapse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse.
2121
2222
## Configuration steps
2323

2424
1. **Configure an Azure Active Directory** - For more information, see [Administering your Azure AD directory](https://msdn.microsoft.com/library/azure/hh967611.aspx), [Integrating your on-premises identities with Azure Active Directory](../active-directory/hybrid/whatis-hybrid-identity.md), [Add your own domain name to Azure AD](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), [Microsoft Azure now supports federation with Windows Server Active Directory](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), and [Manage Azure AD using Windows PowerShell](https://msdn.microsoft.com/library/azure/jj151815.aspx).
25-
2. **Configure MFA** - For step-by-step instructions, see [What is Azure Multi-Factor Authentication?](../active-directory/authentication/multi-factor-authentication.md), [Conditional Access (MFA) with Azure SQL Database and Data Warehouse](sql-database-conditional-access.md). (Full Conditional Access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
26-
3. **Configure SQL Database or SQL Data Warehouse for Azure AD Authentication** - For step-by-step instructions, see [Connecting to SQL Database or SQL Data Warehouse By Using Azure Active Directory Authentication](sql-database-aad-authentication.md).
25+
2. **Configure MFA** - For step-by-step instructions, see [What is Azure Multi-Factor Authentication?](../active-directory/authentication/multi-factor-authentication.md), [Conditional Access (MFA) with Azure SQL Database and Azure Synapse](sql-database-conditional-access.md). (Full Conditional Access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
26+
3. **Configure SQL Database or Azure Synapse for Azure AD Authentication** - For step-by-step instructions, see [Connecting to SQL Database or Azure Synapse By Using Azure Active Directory Authentication](sql-database-aad-authentication.md).
2727
4. **Download SSMS** - On the client computer, download the latest SSMS, from [Download SQL Server Management Studio (SSMS)](https://msdn.microsoft.com/library/mt238290.aspx). For all the features in this topic, use at least July 2017, version 17.2.
2828

2929
## Connecting by using universal authentication with SSMS
3030

31-
The following steps show how to connect to SQL Database or SQL Data Warehouse by using the latest SSMS.
31+
The following steps show how to connect to SQL Database or SAzure Synapse by using the latest SSMS.
3232

3333
1. To connect using Universal Authentication, on the **Connect to Server** dialog box, select **Active Directory - Universal with MFA support**. (If you see **Active Directory Universal Authentication** you are not on the latest version of SSMS.)
3434
![1mfa-universal-connect][1]
3535
2. Complete the **User name** box with the Azure Active Directory credentials, in the format `[email protected]`.
3636
![1mfa-universal-connect-user](./media/sql-database-ssms-mfa-auth/1mfa-universal-connect-user.png)
37-
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
37+
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
3838
![mfa-no-tenant-ssms](./media/sql-database-ssms-mfa-auth/mfa-no-tenant-ssms.png)
3939

4040
However, If you are connecting as a guest user using SSMS 17.x or older, you must click **Options**, and on the **Connection Property** dialog box, and complete the **AD domain name or tenant ID** box.
4141
![mfa-tenant-ssms](./media/sql-database-ssms-mfa-auth/mfa-tenant-ssms.png)
4242

43-
4. As usual for SQL Database and SQL Data Warehouse, you must click **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md). Then click **Connect**.
43+
4. As usual for SQL Database and Azure Synapse, you must click **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md). Then click **Connect**.
4444
5. When the **Sign in to your account** dialog box appears, provide the account and password of your Azure Active Directory identity. No password is required if a user is part of a domain federated with Azure AD.
4545
![2mfa-sign-in][2]
4646

@@ -59,7 +59,7 @@ When verification is complete, SSMS connects normally presuming valid credential
5959

6060
## Next steps
6161

62-
- For an overview of Azure SQL Database multi-factor authentication, see Universal Authentication with [SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
62+
- For an overview of Azure SQL Database multi-factor authentication, see Universal Authentication with [SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
6363
- Grant others access to your database: [SQL Database Authentication and Authorization: Granting Access](sql-database-manage-logins.md)
6464
- Make sure others can connect through the firewall: [Configure an Azure SQL Database server-level firewall rule using the Azure portal](sql-database-configure-firewall-settings.md)
6565
- When using **Active Directory- Universal with MFA** authentication, ADAL tracing is available beginning with [SSMS 17.3](https://docs.microsoft.com/sql/ssms/download-sql-server-management-studio-ssms). Off by default, you can turn on ADAL tracing by using the **Tools**, **Options** menu, under **Azure Services**, **Azure Cloud**, **ADAL Output Window Trace Level**, followed by enabling **Output** in the **View** menu. The traces are available in the output window when selecting **Azure Active Directory option**.

articles/sql-database/sql-database-vnet-service-endpoint-rule-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ PolyBase is commonly used to load data into Azure Synapse Analytics from Azure S
129129
> - If you have a general-purpose v1 or blob storage account, you must **first upgrade to v2** using this [guide](https://docs.microsoft.com/azure/storage/common/storage-account-upgrade).
130130
> - For known issues with Azure Data Lake Storage Gen2, please refer to this [guide](https://docs.microsoft.com/azure/storage/data-lake-storage/known-issues).
131131
132-
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL Data Warehouse which you've registered with Azure Active Directory (AAD) as in step#1.
132+
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server (logical server of your Azure Synapse Analytics data warehouse) which you've registered with Azure Active Directory (AAD) as in step#1.
133133

134134
> [!NOTE]
135135
> Only members with Owner privilege can perform this step. For various built-in roles for Azure resources, refer to this [guide](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles).

0 commit comments

Comments
 (0)