Skip to content

Commit c29b907

Browse files
authored
Update sql-database-connectivity-settings.md
few editorial fixes
1 parent 7752205 commit c29b907

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/sql-database/sql-database-connectivity-settings.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,16 @@ This article introduces settings that control connectivity to Azure SQL Database
2323
> [!NOTE]
2424
> Once these settings are applied, they **take effect immediately** and may result in connection loss for your clients if they do not meet the requirements for each setting.
2525
26-
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the screenshot below:
26+
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the following screenshot:
2727

2828
![Screenshot of connectivity settings][1]
2929

3030

3131
## Deny public network access
3232

33-
Customers can connect to Sql Database using public endpoints (IP-based firewall rules, VNET based firewall rules) or private endpoints (using Private Link) as outlined [here](sql-database-networkaccess-overview.md)
33+
Customers can connect to SQL Database using public endpoints (IP-based firewall rules, VNET based firewall rules) or private endpoints (using Private Link) as outlined in the [network access overview](sql-database-networkaccess-overview.md).
3434

35-
When **Deny public network access** setting is set to **Yes**, only connections via private endpoints are allowed and all connectivity via public endpoint is denied with this error message.
35+
When **Deny public network access** setting is set to **Yes**, only connections via private endpoints are allowed and all connections via public endpoints are denied with an error message similar to:
3636

3737
```output
3838
Error 47073
@@ -78,21 +78,21 @@ az sql server update -n sql-server-name -g sql-server-group --set publicNetworkA
7878

7979
## Minimal TLS Version
8080

81-
Minimal TLS Version allows customer to control the version of [Transport Layer Security](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) for their Azure SQL Server.
81+
The Minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) Version allows customer to control the version of the [Transport Layer Security] for their SQL server in Azure.
8282

83-
At present we support TLS 1.0, 1.1 and 1.2. Setting a minimal TLS version ensures that subsequent, newer TLS versions are supported, e.g., choosing >1.1. means only connections with TLS 1.1 and 1.2 are accepted and TLS 1.0 is rejected. After testing to make sure your applications can support it, we recommend setting minimal TLS version to 1.2 since it includes fixes for vulnerabilities found in previous versions and is the highest version of TLS supported in Azure Sql Database.
8483

85-
For customers with applications that rely on older version of TLS, we recommend setting the Minimal TLS version per the requirements of your applications. For customers that rely on applications to connect using an unencrypted connection, we recommend not setting any Minimal TLS Version.
84+
For customers with applications that rely on older versions of TLS, we recommend setting the Minimal TLS Version per the requirements of your applications. For customers that rely on applications to connect using an unencrypted connection, we recommend not setting any Minimal TLS Version.
8685

8786
For more information, see [TLS considerations for SQL Database connectivity](sql-database-connect-query.md#tls-considerations-for-sql-database-connectivity).
8887

89-
After setting Minimal TLS version, login attempts from clients that are using a TLS version less than the Minimal TLS version of the server will fail with following error:
88+
After setting the Minimal TLS Version, login attempts from clients that are using a TLS version lower than the Minimal TLS Version of the server will fail with following error:
89+
9090
```output
9191
Error 47072
9292
Login failed with invalid TLS version
9393
```
9494

95-
## Set Minimal TLS Version via PowerShell
95+
## Set minimal TLS version via PowerShell
9696

9797
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
9898
> [!IMPORTANT]

0 commit comments

Comments
 (0)