Skip to content

Commit 9e48da5

Browse files
authored
Merge pull request #174419 from DavidTrigano/patch-35
Update sql-database-vulnerability-assessment-storage.md
2 parents 89a905c + 817d098 commit 9e48da5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ If you are limiting access to your storage account in Azure for certain VNets or
2121
The SQL Vulnerability Assessment service needs permission to the storage account to save baseline and scan results. There are three methods:
2222
- **Use Storage Account key**: Azure creates the SAS key and saves it (though we don't save the account key)
2323
- **Use Storage SAS key**: The SAS key must have: Write | List | Read | Delete permissions
24-
- **Use SQL Server managed identity**: The SQL Server must have a managed identity. The storage account must have a role assignment for the SQL Managed Identity as StorageBlobContributor. When you apply the settings, the VA fields storageContainerSasKey and storageAccountAccessKey must be empty. When storage is behind a firewall or virtual network, then the SQL managed identity is required.
24+
- **Use SQL Server managed identity**: The SQL Server must have a managed identity. The storage account must have a role assignment for the SQL Managed Identity as [Storage Blob Data Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor). When you apply the settings, the VA fields storageContainerSasKey and storageAccountAccessKey must be empty. When storage is behind a firewall or virtual network, then the SQL managed identity is required.
2525

26-
When you use the Azure portal to save SQL VA settings, Azure checks if you have permission to assign a new role assignment for the managed identity as StorageBlobContributor on the storage. If permissions are assigned, Azure uses SQL Server managed identity, otherwise Azure uses the key method.
26+
When you use the Azure portal to save SQL VA settings, Azure checks if you have permission to assign a new role assignment for the managed identity as [Storage Blob Data Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) on the storage. If permissions are assigned, Azure uses SQL Server managed identity, otherwise Azure uses the key method.
2727

2828
## Enable Azure SQL Database VA scanning access to the storage account
2929

0 commit comments

Comments
 (0)