You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-firewall-configure.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,30 +1,29 @@
1
1
---
2
2
title: IP firewall rules
3
-
description: Configure server-level IP firewall rules for a SQL database or SQL Data Warehouse firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
3
+
description: Configure server-level IP firewall rules for a SQL database or Azure Synapse Analytics firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
4
4
services: sql-database
5
5
ms.service: sql-database
6
6
ms.subservice: security
7
-
titleSuffix: Azure SQL Database and SQL Data Warehouse
8
-
ms.custom:
7
+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
9
8
ms.devlang:
10
9
ms.topic: conceptual
11
10
author: VanMSFT
12
11
ms.author: vanto
13
12
ms.reviewer: carlrab
14
13
ms.date: 03/18/2019
15
14
---
16
-
# Azure SQL Database and Azure SQL Data Warehouse IP firewall rules
15
+
# Azure SQL Database and Azure Synapse Analytics IP firewall rules
17
16
18
17
> [!NOTE]
19
-
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure SQL Data Warehouse databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and SQL Data Warehouse.
18
+
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure Synapse Analytics databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and Azure Synapse.
20
19
21
20
> [!IMPORTANT]
22
21
> This article does *not* apply to *Azure SQL Database Managed Instance*. For information about network configuration, see [Connect your application to Azure SQL Database Managed Instance](sql-database-managed-instance-connect-app.md).
23
22
24
23
When you create a new Azure SQL server named *mysqlserver*, for example, the SQL Database firewall blocks all access to the public endpoint for the server (which is accessible at *mysqlserver.database.windows.net*).
25
24
26
25
> [!IMPORTANT]
27
-
> SQL Data Warehouse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
26
+
> Azure Synapse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
28
27
29
28
## How the firewall works
30
29
Connection attempts from the internet and Azure must pass through the firewall before they reach your SQL server or SQL database, as the following diagram shows.
@@ -247,7 +246,7 @@ Consider the following points when access to the SQL Database service doesn't be
247
246
248
247
-**The login isn't authorized, or an incorrect password was used:**
249
248
250
-
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and SQL Data Warehouse](sql-database-manage-logins.md).
249
+
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and Azure Synapse](sql-database-manage-logins.md).
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-networkaccess-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ ms.date: 03/09/2020
24
24
25
25
When you create a new Azure SQL Server from the [Azure portal](sql-database-single-database-get-started.md), the result is a public endpoint in the format, *yourservername.database.windows.net*.
26
26
27
-
You can use the following network access controls to selectively allow access to the SQl Database via the public endpoint:
27
+
You can use the following network access controls to selectively allow access to the SQL Database via the public endpoint:
28
28
- Allow Azure Services: When set to ON, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
29
29
30
30
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
@@ -51,7 +51,7 @@ You can also change this setting via the firewall pane after the Azure SQL Serve
51
51
52
52
When set to **ON** Azure SQL Server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
53
53
54
-
In many cases, the **ON** setting is more permissive than what most customers want.They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
54
+
In many cases, the **ON** setting is more permissive than what most customers want.They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to SQL Database via an Azure IP address.
55
55
56
56
### Import Export Service
57
57
Import Export Service does not work **Allow Azure services to access server** set to OFF. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
@@ -60,7 +60,7 @@ Import Export Service does not work **Allow Azure services to access server** s
60
60
To use the Data sync feature with **Allow Azure services to access server** set to OFF, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
61
61
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
62
62
63
-
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region
63
+
Use the following PowerShell script to generate the IP addresses corresponding to SQL service tag for West US region
> Get-AzNetworkServiceTag returns the global range for Sql Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
79
+
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
80
80
81
81
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation and this needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-private-endpoint-overview.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,8 +173,6 @@ To establish connectivity from an on-premises environment to the SQL Database, c
173
173
174
174
PolyBase is commonly used to load data into Azure Synapse Analytics from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure Synapse Analytics connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
175
175
176
-
177
-
178
176
## Next steps
179
177
180
178
- For an overview of Azure SQL Database security, see [Securing your database](sql-database-security-overview.md)
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-ssms-mfa-authentication-configure.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure multi-factor authentication
3
-
description: Learn how to use Multi-Factored Authentication with SSMS for SQL Database and SQL Data Warehouse.
3
+
description: Learn how to use Multi-Factored Authentication with SSMS for SQL Database and Azure Synapse Aalytics
4
4
services: sql-database
5
5
ms.service: sql-database
6
6
ms.subservice: security
@@ -14,33 +14,33 @@ ms.date: 08/27/2019
14
14
---
15
15
# Configure multi-factor authentication for SQL Server Management Studio and Azure AD
16
16
17
-
This topic shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to Azure [SQL Database](sql-database-technical-overview.md) and [SQL Data Warehouse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md). For an overview of Azure SQL Database multi-factor authentication, see [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
17
+
This topic shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md). For an overview of Azure SQL Database multi-factor authentication, see [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
18
18
19
19
> [!NOTE]
20
-
> This topic applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
20
+
> This topic applies to Azure SQL server, and to both SQL Database and Azure Synapse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse.
21
21
22
22
## Configuration steps
23
23
24
24
1.**Configure an Azure Active Directory** - For more information, see [Administering your Azure AD directory](https://msdn.microsoft.com/library/azure/hh967611.aspx), [Integrating your on-premises identities with Azure Active Directory](../active-directory/hybrid/whatis-hybrid-identity.md), [Add your own domain name to Azure AD](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), [Microsoft Azure now supports federation with Windows Server Active Directory](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/), and [Manage Azure AD using Windows PowerShell](https://msdn.microsoft.com/library/azure/jj151815.aspx).
25
-
2.**Configure MFA** - For step-by-step instructions, see [What is Azure Multi-Factor Authentication?](../active-directory/authentication/multi-factor-authentication.md), [Conditional Access (MFA) with Azure SQL Database and Data Warehouse](sql-database-conditional-access.md). (Full Conditional Access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
26
-
3.**Configure SQL Database or SQL Data Warehouse for Azure AD Authentication** - For step-by-step instructions, see [Connecting to SQL Database or SQL Data Warehouse By Using Azure Active Directory Authentication](sql-database-aad-authentication.md).
25
+
2.**Configure MFA** - For step-by-step instructions, see [What is Azure Multi-Factor Authentication?](../active-directory/authentication/multi-factor-authentication.md), [Conditional Access (MFA) with Azure SQL Database and Azure Synapse](sql-database-conditional-access.md). (Full Conditional Access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
26
+
3.**Configure SQL Database or Azure Synapse for Azure AD Authentication** - For step-by-step instructions, see [Connecting to SQL Database or Azure Synapse By Using Azure Active Directory Authentication](sql-database-aad-authentication.md).
27
27
4.**Download SSMS** - On the client computer, download the latest SSMS, from [Download SQL Server Management Studio (SSMS)](https://msdn.microsoft.com/library/mt238290.aspx). For all the features in this topic, use at least July 2017, version 17.2.
28
28
29
29
## Connecting by using universal authentication with SSMS
30
30
31
-
The following steps show how to connect to SQL Database or SQL Data Warehouse by using the latest SSMS.
31
+
The following steps show how to connect to SQL Database or SAzure Synapse by using the latest SSMS.
32
32
33
33
1. To connect using Universal Authentication, on the **Connect to Server** dialog box, select **Active Directory - Universal with MFA support**. (If you see **Active Directory Universal Authentication** you are not on the latest version of SSMS.)
34
34
![1mfa-universal-connect][1]
35
35
2. Complete the **User name** box with the Azure Active Directory credentials, in the format `[email protected]`.
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
37
+
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
However, If you are connecting as a guest user using SSMS 17.x or older, you must click **Options**, and on the **Connection Property** dialog box, and complete the **AD domain name or tenant ID** box.
4. As usual for SQL Database and SQL Data Warehouse, you must click **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md). Then click **Connect**.
43
+
4. As usual for SQL Database and Azure Synapse, you must click **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md). Then click **Connect**.
44
44
5. When the **Sign in to your account** dialog box appears, provide the account and password of your Azure Active Directory identity. No password is required if a user is part of a domain federated with Azure AD.
45
45
![2mfa-sign-in][2]
46
46
@@ -59,7 +59,7 @@ When verification is complete, SSMS connects normally presuming valid credential
59
59
60
60
## Next steps
61
61
62
-
- For an overview of Azure SQL Database multi-factor authentication, see Universal Authentication with [SQL Database and SQL Data Warehouse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
62
+
- For an overview of Azure SQL Database multi-factor authentication, see Universal Authentication with [SQL Database and Azure Synapse (SSMS support for MFA)](sql-database-ssms-mfa-authentication.md).
63
63
- Grant others access to your database: [SQL Database Authentication and Authorization: Granting Access](sql-database-manage-logins.md)
64
64
- Make sure others can connect through the firewall: [Configure an Azure SQL Database server-level firewall rule using the Azure portal](sql-database-configure-firewall-settings.md)
65
65
- When using **Active Directory- Universal with MFA** authentication, ADAL tracing is available beginning with [SSMS 17.3](https://docs.microsoft.com/sql/ssms/download-sql-server-management-studio-ssms). Off by default, you can turn on ADAL tracing by using the **Tools**, **Options** menu, under **Azure Services**, **Azure Cloud**, **ADAL Output Window Trace Level**, followed by enabling **Output** in the **View** menu. The traces are available in the output window when selecting **Azure Active Directory option**.
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-vnet-service-endpoint-rule-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ PolyBase is commonly used to load data into Azure Synapse Analytics from Azure S
129
129
> - If you have a general-purpose v1 or blob storage account, you must **first upgrade to v2** using this [guide](https://docs.microsoft.com/azure/storage/common/storage-account-upgrade).
130
130
> - For known issues with Azure Data Lake Storage Gen2, please refer to this [guide](https://docs.microsoft.com/azure/storage/data-lake-storage/known-issues).
131
131
132
-
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL Data Warehouse which you've registered with Azure Active Directory (AAD) as in step#1.
132
+
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server (logical server of your Azure Synapse Analytics data warehouse) which you've registered with Azure Active Directory (AAD) as in step#1.
133
133
134
134
> [!NOTE]
135
135
> Only members with Owner privilege can perform this step. For various built-in roles for Azure resources, refer to this [guide](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles).
0 commit comments