You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-connectivity-settings.md
+67-5Lines changed: 67 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.date: 03/09/2020
13
13
14
14
# Azure SQL Connectivity Settings
15
15
> [!NOTE]
16
-
> This article applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
16
+
> This article applies to the logical SQL server in Azure used for both Azure SQL Database and SQL Data Warehouse databases that are created on the logical server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
17
17
18
18
> [!IMPORTANT]
19
19
> This article does *not* apply to **Azure SQL Database Managed Instance**
@@ -23,22 +23,26 @@ This article introduces settings that control connectivity to Azure SQL Database
23
23
> [!NOTE]
24
24
> Once these settings are applied, they **take effect immediately** and may result in connection loss for your clients if they do not meet the requirements for each setting.
25
25
26
-
The connectivity settings are accessible from the **Firewalls and virtual networks**blade as shown in the screenshot below:
26
+
The connectivity settings are accessible from the **Firewalls and virtual networks**screen as shown in the following screenshot:
27
27
28
28
![Screenshot of connectivity settings][1]
29
29
30
30
31
31
## Deny public network access
32
-
In the Azure portal, when the **Deny public network access** setting is set to **Yes**, only connections via private endpoints are allowed. When this setting is set to **No**, clients can connect using the private or public endpoint.
33
32
34
-
After setting **Deny public network access** to **Yes**, login attempts from clients using public endpoint will fail with the following error:
33
+
Customers can connect to SQL Database using public endpoints (IP-based firewall rules, VNET based firewall rules) or private endpoints (using Private Link) as outlined in the [network access overview](sql-database-networkaccess-overview.md).
34
+
35
+
When **Deny public network access** setting is set to **Yes**, only connections via private endpoints are allowed and all connections via public endpoints are denied with an error message similar to:
35
36
36
37
```output
37
38
Error 47073
38
-
An instance-specific error occurred while establishing a connection to SQL Server. The public network interface on this server is not accessible. To connect to this server, use the Private Endpoint from inside your virtual network.
39
+
An instance-specific error occurred while establishing a connection to SQL Server.
40
+
The public network interface on this server is not accessible.
41
+
To connect to this server, use the Private Endpoint from inside your virtual network.
> The PowerShell Azure Resource Manager module is still supported by Azure SQL Database, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](https://docs.microsoft.com/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
> All scripts in this section requires [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
61
66
62
67
### Azure CLI in a bash shell
68
+
63
69
The following CLI script shows how to change the **Public Network Access** in a bash shell:
64
70
65
71
```azurecli-interactive
@@ -72,11 +78,64 @@ az sql server update -n sql-server-name -g sql-server-group --set publicNetworkA
72
78
73
79
```
74
80
81
+
## Minimal TLS Version
82
+
83
+
The Minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) Version setting allows customers to control the version of TLS used by their Azure SQL Database.
84
+
85
+
At present we support TLS 1.0, 1.1 and 1.2. Setting a Minimal TLS Version ensures that subsequent, newer TLS versions are supported. For example, e.g., choosing a TLS version greater than 1.1. means only connections with TLS 1.1 and 1.2 are accepted and TLS 1.0 is rejected. After testing to confirm your applications supports the it, we recommend setting minimal TLS version to 1.2 since it includes fixes for vulnerabilities found in previous versions and is the highest version of TLS supported in Azure SQL Database.
86
+
87
+
For customers with applications that rely on older versions of TLS, we recommend setting the Minimal TLS Version per the requirements of your applications. For customers that rely on applications to connect using an unencrypted connection, we recommend not setting any Minimal TLS Version.
88
+
89
+
For more information, see [TLS considerations for SQL Database connectivity](sql-database-connect-query.md#tls-considerations-for-sql-database-connectivity).
90
+
91
+
After setting the Minimal TLS Version, login attempts from clients that are using a TLS version lower than the Minimal TLS Version of the server will fail with following error:
> The PowerShell Azure Resource Manager module is still supported by Azure SQL Database, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](https://docs.microsoft.com/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
103
+
104
+
The following PowerShell script shows how to `Get` and `Set` the **Minimal TLS Version** property at the logical server level:
> The PowerShell Azure Resource Manager module is still supported by Azure SQL Database, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](https://docs.microsoft.com/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
- For an overview of how connectivity works in Azure SQL Database, refer to [Azure SQL Connectivity Architecture](sql-database-connectivity-architecture.md)
137
199
- For information on how to change the Azure SQL Database connection policy for an Azure SQL Database server, see [conn-policy](https://docs.microsoft.com/cli/azure/sql/server/conn-policy).
0 commit comments