Skip to content

Commit e764407

Browse files
authored
Merge pull request #213965 from MicrosoftDocs/release-arc-data
[ASK MODE] Publish Azure Arc-enabled data services October 2022 release
2 parents 3dec733 + e0d1843 commit e764407

24 files changed

+411
-228
lines changed

articles/azure-arc/data/active-directory-introduction.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,14 @@ ms.subservice: azure-arc-data-sqlmi
77
author: mikhailalmeida
88
ms.author: mialmei
99
ms.reviewer: mikeray
10-
ms.date: 04/15/2022
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

1414
# Azure Arc-enabled SQL Managed Instance with Active Directory authentication
1515

1616
Azure Arc-enabled data services support Active Directory (AD) for Identity and Access Management (IAM). The Arc-enabled SQL Managed Instance uses an existing on-premises Active Directory (AD) domain for authentication.
1717

18-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
19-
2018
This article describes how to enable Azure Arc-enabled SQL Managed Instance with Active Directory (AD) Authentication. The article demonstrates two possible AD integration modes:
2119
- Customer-managed keytab (CMK)
2220
- System-managed keytab (SMK)
@@ -55,14 +53,14 @@ To enable Active Directory authentication for Arc-enabled SQL Managed Instance,
5553

5654
The following section compares these modes.
5755

58-
| |Customer-managed keytab​|System-managed keytab - Preview​|
56+
| |Customer-managed keytab​|System-managed keytab|
5957
|------------------|---------|--------|
6058
|**Use cases**|Small and medium size businesses who are familiar with managing Active Directory objects and want flexibility in their automation process |All sizes of businesses - seeking to highly automated Active Directory management experience|
6159
|**User provides**|An Active Directory account and SPNs under that account, and a [keytab file](/sql/linux/sql-server-linux-ad-auth-understanding#what-is-a-keytab-file) for Active Directory authentication |An [Organizational Unit (OU)](../../active-directory-domain-services/create-ou.md) and a domain service account has [sufficient permissions](deploy-system-managed-keytab-active-directory-connector.md?#prerequisites) on that OU in Active Directory.|
6260
|**Characteristics**|User managed. Users bring the Active Directory account, which impersonates the identity of the managed instance and the keytab file. |System managed. The system creates a domain service account for each managed instance and sets SPNs automatically on that account. It also, creates and delivers a keytab file to the managed instance. |
6361
|**Deployment process**| 1. Deploy data controller <br/> 2. Create keytab file <br/>3. Set up keytab information to Kubernetes secret<br/> 4. Deploy AD connector, deploy SQL managed instance<br/><br/>For more information, see [Deploy a customer-managed keytab Active Directory connector](deploy-customer-managed-keytab-active-directory-connector.md) | 1. Deploy data controller, deploy AD connector<br/>2. Deploy SQL managed instance<br/><br/>For more information, see [Deploy a system-managed keytab Active Directory connector](deploy-system-managed-keytab-active-directory-connector.md) |
6462
|**Manageability**|You can create the keytab file by following the instructions from [Active Directory utility (`adutil`)](/sql/linux/sql-server-linux-ad-auth-adutil-introduction). Manual keytab rotation. |Managed keytab rotation.|
65-
|**Limitations**|We do not recommend sharing keytab files among services. Each service should have a specific keytab file. As the number of keytab files increases the level of effort and complexity increases. |Managed keytab generation and rotation. The service account will require sufficient permissions in Active Directory to manage the credentials. |
63+
|**Limitations**|We do not recommend sharing keytab files among services. Each service should have a specific keytab file. As the number of keytab files increases the level of effort and complexity increases. |Managed keytab generation and rotation. The service account will require sufficient permissions in Active Directory to manage the credentials. <br/> <br/> Distributed Availability Group is not supported.|
6664

6765
For either mode, you need a specific Active Directory account, keytab, and Kubernetes secret for each SQL managed instance.
6866

articles/azure-arc/data/active-directory-prerequisites.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,14 @@ ms.subservice: azure-arc-data-sqlmi
77
author: mikhailalmeida
88
ms.author: mialmei
99
ms.reviewer: mikeray
10-
ms.date: 04/21/2022
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

1414
# Azure Arc-enabled SQL Managed Instance in Active Directory authentication with system-managed keytab - prerequisites
1515

1616
This document explains how to prepare to deploy Azure Arc-enabled data services with Active Directory (AD) authentication. Specifically the article describes Active Directory objects you need to configure before the deployment of Kubernetes resources.
1717

18-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
19-
2018
[The introduction](active-directory-introduction.md#compare-ad-integration-modes) describes two different integration modes:
2119
- *System-managed keytab* mode allows the system to create and manage the AD accounts for each SQL Managed Instance.
2220
- *Customer-managed keytab* mode allows you to create and manage the AD accounts for each SQL Managed Instance.

articles/azure-arc/data/connect-active-directory-sql-managed-instance.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,14 @@ ms.subservice: azure-arc-data-sqlmi
77
author: mikhailalmeida
88
ms.author: mialmei
99
ms.reviewer: mikeray
10-
ms.date: 12/15/2021
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

1414
# Connect to AD-integrated Azure Arc-enabled SQL Managed Instance
1515

1616
This article describes how to connect to SQL Managed Instance endpoint using Active Directory (AD) authentication. Before you proceed, make sure you have an AD-integrated Azure Arc-enabled SQL Managed Instance deployed already.
1717

18-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
19-
2018
See [Tutorial – Deploy AD-integrated SQL Managed Instance](deploy-active-directory-sql-managed-instance.md) to deploy Azure Arc-enabled SQL Managed Instance with Active Directory authentication enabled.
2119

2220
> [!NOTE]

articles/azure-arc/data/deploy-active-directory-connector-cli.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-arc-data-sqlmi
77
author: mikhailalmeida
88
ms.author: mialmei
99
ms.reviewer: mikeray
10-
ms.date: 08/16/2022
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

@@ -16,8 +16,6 @@ ms.topic: how-to
1616

1717
This article explains how to deploy an Active Directory (AD) connector using Azure CLI. The AD connector is a key component to enable Active Directory authentication on Azure Arc-enabled SQL Managed Instance.
1818

19-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
20-
2119
## Prerequisites
2220

2321
### Install tools

articles/azure-arc/data/deploy-active-directory-connector-portal.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,14 @@ ms.subservice: azure-arc-data-sqlmi
77
author: MikeRayMSFT
88
ms.author: mikeray
99
ms.reviewer: dinethi
10-
ms.date: 05/24/2022
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

1414
# Tutorial – Deploy Active Directory connector using Azure portal
1515

1616
Active Directory (AD) connector is a key component to enable Active Directory authentication on Azure Arc-enabled SQL Managed Instances.
1717

18-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
19-
2018
This article explains how to deploy, manage, and delete an Active Directory (AD) connector in directly connected mode from the Azure portal.
2119

2220
## Prerequisites

articles/azure-arc/data/deploy-active-directory-sql-managed-instance-cli.md

Lines changed: 26 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,14 @@ ms.subservice: azure-arc-data-sqlmi
77
author: mikhailalmeida
88
ms.author: mialmei
99
ms.reviewer: mikeray
10-
ms.date: 04/28/2022
10+
ms.date: 10/11/2022
1111
ms.topic: how-to
1212
---
1313

1414
# Deploy Active Directory integrated Azure Arc-enabled SQL Managed Instance using Azure CLI
1515

1616
This article explains how to deploy Azure Arc-enabled SQL Managed Instance with Active Directory (AD) authentication using Azure CLI.
1717

18-
[!INCLUDE [azure-arc-data-preview](../../../includes/azure-arc-data-preview.md)]
19-
2018
See these articles for specific instructions:
2119

2220
- [Tutorial – Deploy AD connector in customer-managed keytab mode](deploy-customer-managed-keytab-active-directory-connector.md)
@@ -56,8 +54,10 @@ az sql mi-arc create
5654
--ad-connector-name < your AD connector name >
5755
--keytab-secret < SQL MI keytab secret name >
5856
--ad-account-name < SQL MI AD user account >
59-
--primary-dns-name < SQL MI DNS endpoint >
60-
--primary-port-number < SQL MI port number >
57+
--primary-dns-name < SQL MI primary endpoint DNS name >
58+
--primary-port-number < SQL MI primary endpoint port number >
59+
--secondary-dns-name < SQL MI secondary endpoint DNS name >
60+
--secondary-port-number < SQL MI secondary endpoint port number >
6161
--use-k8s
6262
```
6363

@@ -72,6 +72,8 @@ az sql mi-arc create
7272
--ad-account-name arcuser
7373
--primary-dns-name arcsqlmi.contoso.local
7474
--primary-port-number 31433
75+
--secondary-dns-name arcsqlmi-2.contoso.local
76+
--secondary-port-number 31434
7577
--use-k8s
7678
```
7779

@@ -82,10 +84,11 @@ az sql mi-arc create
8284
--name < SQL MI name >
8385
--ad-connector-name < your AD connector name >
8486
--keytab-secret < SQL MI keytab secret name >
85-
--ad-account-name < SQL MI AD user account >
86-
--primary-dns-name < SQL MI DNS endpoint >
87-
--primary-port-number < SQL MI port number >
88-
--location < your cloud region >
87+
--ad-account-name < SQL MI AD user account >
88+
--primary-dns-name < SQL MI primary endpoint DNS name >
89+
--primary-port-number < SQL MI primary endpoint port number >
90+
--secondary-dns-name < SQL MI secondary endpoint DNS name >
91+
--secondary-port-number < SQL MI secondary endpoint port number >
8992
--custom-location < your custom location >
9093
--resource-group < resource-group >
9194
```
@@ -100,7 +103,8 @@ az sql mi-arc create
100103
--ad-account-name arcuser
101104
--primary-dns-name arcsqlmi.contoso.local
102105
--primary-port-number 31433
103-
--location westeurope
106+
--secondary-dns-name arcsqlmi-2.contoso.local
107+
--secondary-port-number 31434
104108
--custom-location private-location
105109
--resource-group arc-rg
106110
```
@@ -172,8 +176,10 @@ az sql mi-arc create
172176
--k8s-namespace < namespace >
173177
--ad-connector-name < your AD connector name >
174178
--ad-account-name < SQL MI AD user account >
175-
--primary-dns-name < SQL MI DNS endpoint >
176-
--primary-port-number < SQL MI port number >
179+
--primary-dns-name < SQL MI primary endpoint DNS name >
180+
--primary-port-number < SQL MI primary endpoint port number >
181+
--secondary-dns-name < SQL MI secondary endpoint DNS name >
182+
--secondary-port-number < SQL MI secondary endpoint port number >
177183
--use-k8s
178184
```
179185

@@ -187,6 +193,8 @@ az sql mi-arc create
187193
--ad-account-name arcuser
188194
--primary-dns-name arcsqlmi.contoso.local
189195
--primary-port-number 31433
196+
--secondary-dns-name arcsqlmi-2.contoso.local
197+
--secondary-port-number 31434
190198
--use-k8s
191199
```
192200

@@ -197,9 +205,10 @@ az sql mi-arc create
197205
--name < SQL MI name >
198206
--ad-connector-name < your AD connector name >
199207
--ad-account-name < SQL MI AD user account >
200-
--primary-dns-name < SQL MI DNS endpoint >
201-
--primary-port-number < SQL MI port number >
202-
--location < your cloud region >
208+
--primary-dns-name < SQL MI primary endpoint DNS name >
209+
--primary-port-number < SQL MI primary endpoint port number >
210+
--secondary-dns-name < SQL MI secondary endpoint DNS name >
211+
--secondary-port-number < SQL MI secondary endpoint port number >
203212
--custom-location < your custom location >
204213
--resource-group <resource-group>
205214
```
@@ -213,7 +222,8 @@ az sql mi-arc create
213222
--ad-account-name arcuser
214223
--primary-dns-name arcsqlmi.contoso.local
215224
--primary-port-number 31433
216-
--location westeurope
225+
--secondary-dns-name arcsqlmi-2.contoso.local
226+
--secondary-port-number 31434
217227
--custom-location private-location
218228
--resource-group arc-rg
219229
```

0 commit comments

Comments
 (0)