Skip to content

Commit b3c9203

Browse files
committed
Update Azure SQL Database doc linked service section
1 parent 77d7ce6 commit b3c9203

File tree

1 file changed

+21
-9
lines changed

1 file changed

+21
-9
lines changed

articles/data-factory/connector-azure-sql-database.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: data-factory
88
ms.subservice: data-movement
99
ms.topic: conceptual
1010
ms.custom: synapse
11-
ms.date: 07/04/2022
11+
ms.date: 08/10/2022
1212
---
1313

1414
# Copy and transform data in Azure SQL Database by using Azure Data Factory or Azure Synapse Analytics
@@ -84,21 +84,17 @@ The following sections provide details about properties that are used to define
8484

8585
## Linked service properties
8686

87-
These properties are supported for an Azure SQL Database linked service:
87+
These generic properties are supported for an Azure SQL Database linked service:
8888

8989
| Property | Description | Required |
9090
|:--- |:--- |:--- |
9191
| type | The **type** property must be set to **AzureSqlDatabase**. | Yes |
9292
| connectionString | Specify information needed to connect to the Azure SQL Database instance for the **connectionString** property. <br/>You also can put a password or service principal key in Azure Key Vault. If it's SQL authentication, pull the `password` configuration out of the connection string. For more information, see the JSON example following the table and [Store credentials in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
93-
| servicePrincipalId | Specify the application's client ID. | Yes, when you use Azure AD authentication with a service principal |
94-
| servicePrincipalKey | Specify the application's key. Mark this field as **SecureString** to store it securely or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes, when you use Azure AD authentication with a service principal |
95-
| tenant | Specify the tenant information, like the domain name or tenant ID, under which your application resides. Retrieve it by hovering the mouse in the upper-right corner of the Azure portal. | Yes, when you use Azure AD authentication with a service principal |
9693
| azureCloudType | For service principal authentication, specify the type of Azure cloud environment to which your Azure AD application is registered. <br/> Allowed values are **AzurePublic**, **AzureChina**, **AzureUsGovernment**, and **AzureGermany**. By default, the data factory or Synapse pipeline's cloud environment is used. | No |
9794
| alwaysEncryptedSettings | Specify **alwaysencryptedsettings** information that's needed to enable Always Encrypted to protect sensitive data stored in SQL server by using either managed identity or service principal. For more information, see the JSON example following the table and [Using Always Encrypted](#using-always-encrypted) section. If not specified, the default always encrypted setting is disabled. |No |
98-
| credentials | Specify the user-assigned managed identity as the credential object. | Yes, when you use user-assigned managed identity authentication |
9995
| connectVia | This [integration runtime](concepts-integration-runtime.md) is used to connect to the data store. You can use the Azure integration runtime or a self-hosted integration runtime if your data store is located in a private network. If not specified, the default Azure integration runtime is used. | No |
10096

101-
For different authentication types, refer to the following sections on prerequisites and JSON samples, respectively:
97+
For different authentication types, refer to the following sections on specific properties, prerequisites and JSON samples, respectively:
10298

10399
- [SQL authentication](#sql-authentication)
104100
- [Service principal authentication](#service-principal-authentication)
@@ -110,6 +106,8 @@ For different authentication types, refer to the following sections on prerequis
110106
111107
### SQL authentication
112108

109+
When you use SQL authentication authentication type, specify the generic properties that are described in the preceding section.
110+
113111
**Example: using SQL authentication**
114112

115113
```json
@@ -182,7 +180,15 @@ For different authentication types, refer to the following sections on prerequis
182180

183181
### Service principal authentication
184182

185-
To use a service principal-based Azure AD application token authentication, follow these steps:
183+
When you use service principal authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
184+
185+
| Property | Description | Required |
186+
|:--- |:--- |:--- |
187+
| servicePrincipalId | Specify the application's client ID. | Yes |
188+
| servicePrincipalKey | Specify the application's key. Mark this field as **SecureString** to store it securely or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
189+
| tenant | Specify the tenant information, like the domain name or tenant ID, under which your application resides. Retrieve it by hovering the mouse in the upper-right corner of the Azure portal.| Yes |
190+
191+
You also need to follow the steps below:
186192

187193
1. [Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal) from the Azure portal. Make note of the application name and the following values that define the linked service:
188194

@@ -274,7 +280,13 @@ To use system-assigned managed identity authentication, follow these steps.
274280

275281
A data factory or Synapse workspace can be associated with a [user-assigned managed identities](data-factory-service-identity.md#user-assigned-managed-identity) that represents the service when authenticating to other resources in Azure. You can use this managed identity for Azure SQL Database authentication. The designated factory or Synapse workspace can access and copy data from or to your database by using this identity.
276282

277-
To use user-assigned managed identity authentication, follow these steps.
283+
When you use user-assigned managed identity authentication, in addition to the generic properties that are described in the preceding section, specify the following properties:
284+
285+
| Property | Description | Required |
286+
|:--- |:--- |:--- |
287+
| credentials | Specify the user-assigned managed identity as the credential object. | Yes |
288+
289+
You also need to follow the steps below:
278290

279291
1. [Provision an Azure Active Directory administrator](/azure/azure-sql/database/authentication-aad-configure#provision-azure-ad-admin-sql-database) for your server on the Azure portal if you haven't already done so. The Azure AD administrator can be an Azure AD user or an Azure AD group. If you grant the group with user-assigned managed identity an admin role, skip steps 3. The administrator has full access to the database.
280292

0 commit comments

Comments
 (0)