Skip to content

Commit eca1195

Browse files
committed
find and replace SQL Analytics
1 parent d41ff23 commit eca1195

9 files changed

+35
-33
lines changed

articles/synapse-analytics/sql/access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,4 +168,4 @@ DROP USER [<workspacename>];
168168

169169
## Next steps
170170

171-
For an overview of access and control in SQL Analytics, see [SQL Analytics access control](../sql/access-control.md). To learn more about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx). Additional information about database roles, can be found in the [Database roles](https://msdn.microsoft.com/library/ms189121.aspx) article.
171+
For an overview of access and control in Synapse SQL, see [Synapse SQL access control](../sql/access-control.md). To learn more about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx). Additional information about database roles, can be found in the [Database roles](https://msdn.microsoft.com/library/ms189121.aspx) article.

articles/synapse-analytics/sql/active-directory-authentication.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Active Directory
3-
description: Learn about how to use Azure Active Directory for authentication with SQL Database, Managed Instance, and SQL Analytics
3+
description: Learn about how to use Azure Active Directory for authentication with SQL Database, Managed Instance, and Synapse SQL
44
services: synapse-analytics
55
author: vvasic-msft
66
ms.service: synapse-analytics
@@ -9,7 +9,7 @@ ms.date: 1/23/2020
99
ms.author: vvasic
1010
ms.reviewer: jrasnick
1111
---
12-
# Use Azure Active Directory Authentication for authentication with SQL Analytics
12+
# Use Azure Active Directory Authentication for authentication with Synapse SQL
1313

1414
Azure Active Directory authentication is a mechanism of connecting to [Azure Synapse Analytics](../overview-faq.md) by using identities in Azure Active Directory (Azure AD).
1515

@@ -22,7 +22,7 @@ With Azure AD authentication, you can centrally manage the identities of users h
2222
- It can eliminate storing passwords by enabling integrated Windows authentication and other forms of authentication supported by Azure Active Directory.
2323
- Azure AD supports token-based authentication for applications connecting to Azure Synapse.
2424
- Azure AD authentication supports ADFS (domain federation) or native user/password authentication for a local Azure Active Directory without domain synchronization.
25-
- Azure AD supports connections from SQL Server Management Studio that use Active Directory Universal Authentication, which includes Multi-Factor Authentication (MFA). MFA includes strong authentication with a range of easy verification options — phone call, text message, smart cards with pin, or mobile app notification. For more information, see [SSMS support for Azure AD MFA with SQL Analytics](mfa-authentication.md).
25+
- Azure AD supports connections from SQL Server Management Studio that use Active Directory Universal Authentication, which includes Multi-Factor Authentication (MFA). MFA includes strong authentication with a range of easy verification options — phone call, text message, smart cards with pin, or mobile app notification. For more information, see [SSMS support for Azure AD MFA with Synapse SQL](mfa-authentication.md).
2626
- Azure AD supports similar connections from SQL Server Data Tools (SSDT) that use Active Directory Interactive Authentication. For more information, see
2727
[Azure Active Directory support in SQL Server Data Tools (SSDT)](/sql/ssdt/azure-active-directory?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json&view=azure-sqldw-latest).
2828

@@ -41,7 +41,7 @@ Defining access rights on the files and data that is respected in different data
4141

4242
## Trust architecture
4343

44-
The following high-level diagram summarizes the solution architecture of using Azure AD authentication with SQL Analytics. To support Azure AD native user password, only the Cloud portion and Azure AD/Synapse SQL Analytics is considered. To support Federated authentication (or user/password for Windows credentials), the communication with ADFS block is required. The arrows indicate communication pathways.
44+
The following high-level diagram summarizes the solution architecture of using Azure AD authentication with Synapse SQL. To support Azure AD native user password, only the Cloud portion and Azure AD/Synapse Synapse SQL is considered. To support Federated authentication (or user/password for Windows credentials), the communication with ADFS block is required. The arrows indicate communication pathways.
4545

4646
![aad auth diagram][1]
4747

@@ -51,26 +51,28 @@ The following diagram indicates the federation, trust, and hosting relationships
5151

5252
## Administrator structure
5353

54-
When using Azure AD authentication, there are two Administrator accounts for the SQL Analytics; the original SQL Server administrator and the Azure AD administrator. Only the administrator based on an Azure AD account can create the first Azure AD contained database user in a user database. The Azure AD administrator login can be an Azure AD user or an Azure AD group. When the administrator is a group account, it can be used by any group member, enabling multiple Azure AD administrators for the SQL Analytics instance. Using group account as an administrator enhances manageability by allowing you to centrally add and remove group members in Azure AD without changing the users or permissions in Synapse Analytics workspace. Only one Azure AD administrator (a user or group) can be configured at any time.
54+
When using Azure AD authentication, there are two Administrator accounts for the Synapse SQL; the original SQL Server administrator and the Azure AD administrator. Only the administrator based on an Azure AD account can create the first Azure AD contained database user in a user database. The Azure AD administrator login can be an Azure AD user or an Azure AD group.
55+
56+
When the administrator is a group account, it can be used by any group member, enabling multiple Azure AD administrators for the Synapse SQL instance. Using group account as an administrator enhances manageability by allowing you to centrally add and remove group members in Azure AD without changing the users or permissions in Synapse Analytics workspace. Only one Azure AD administrator (a user or group) can be configured at any time.
5557

5658
![admin structure][3]
5759

5860
## Permissions
5961

6062
To create new users, you must have the `ALTER ANY USER` permission in the database. The `ALTER ANY USER` permission can be granted to any database user. The `ALTER ANY USER` permission is also held by the server administrator accounts, and database users with the `CONTROL ON DATABASE` or `ALTER ON DATABASE` permission for that database, and by members of the `db_owner` database role.
6163

62-
To create a contained database user in SQL Analytics, you must connect to the database or instance using an Azure AD identity. To create the first contained database user, you must connect to the database by using an Azure AD administrator (who is the owner of the database). Any Azure AD authentication is only possible if the Azure AD admin was created for SQL Analytics. If the Azure Active Directory admin was removed from the server, existing Azure Active Directory users created previously inside SQL Analytics can no longer connect to the database using their Azure Active Directory credentials.
64+
To create a contained database user in Synapse SQL, you must connect to the database or instance using an Azure AD identity. To create the first contained database user, you must connect to the database by using an Azure AD administrator (who is the owner of the database). Any Azure AD authentication is only possible if the Azure AD admin was created for Synapse SQL. If the Azure Active Directory admin was removed from the server, existing Azure Active Directory users created previously inside Synapse SQL can no longer connect to the database using their Azure Active Directory credentials.
6365

6466
## Azure AD features and limitations
6567

66-
- The following members of Azure AD can be provisioned in SQL Analytics:
68+
- The following members of Azure AD can be provisioned in Synapse SQL:
6769

6870
- Native members: A member created in Azure AD in the managed domain or in a customer domain. For more information, see [Add your own domain name to Azure AD](../../active-directory/fundamentals/add-custom-domain.md?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json).
6971
- Federated domain members: A member created in Azure AD with a federated domain. For more information, see [Microsoft Azure now supports federation with Windows Server Active Directory](https://azure.microsoft.com/blog/20../../windows-azure-now-supports-federation-with-windows-server-active-directory/).
7072
- Imported members from other Azure AD's who are native or federated domain members.
7173
- Active Directory groups created as security groups.
7274

73-
- Azure AD users that are part of a group that has `db_owner` server role cannot use the **[CREATE DATABASE SCOPED CREDENTIAL](/sql/t-sql/statements/create-database-scoped-credential-transact-sql?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json&view=azure-sqldw-latest)** syntax against SQL Analytics. You will see the following error:
75+
- Azure AD users that are part of a group that has `db_owner` server role cannot use the **[CREATE DATABASE SCOPED CREDENTIAL](/sql/t-sql/statements/create-database-scoped-credential-transact-sql?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json&view=azure-sqldw-latest)** syntax against Synapse SQL. You will see the following error:
7476

7577
`SQL Error [2760] [S0001]: The specified schema name '[email protected]' either does not exist or you do not have permission to use it.`
7678

@@ -102,9 +104,9 @@ The following authentication methods are supported for Azure AD server principal
102104
### Additional considerations
103105

104106
- To enhance manageability, we recommend you provision a dedicated Azure AD group as an administrator.
105-
- Only one Azure AD administrator (a user or group) can be configured for SQL Analytics pool at any time.
107+
- Only one Azure AD administrator (a user or group) can be configured for Synapse SQL pool at any time.
106108
- The addition of Azure AD server principals (logins) for SQL on-demand (preview) allows the possibility of creating multiple Azure AD server principals (logins) that can be added to the `sysadmin` role.
107-
- Only an Azure AD administrator for SQL Analytics can initially connect to the SQL Analytics using an Azure Active Directory account. The Active Directory administrator can configure subsequent Azure AD database users.
109+
- Only an Azure AD administrator for Synapse SQL can initially connect to the Synapse SQL using an Azure Active Directory account. The Active Directory administrator can configure subsequent Azure AD database users.
108110
- We recommend setting the connection timeout to 30 seconds.
109111
- SQL Server 2016 Management Studio and SQL Server Data Tools for Visual Studio 2015 (version 14.0.60311.1April 2016 or later) support Azure Active Directory authentication. (Azure AD authentication is supported by the **.NET Framework Data Provider for SqlServer**; at least version .NET Framework 4.6). Therefore the newest versions of these tools and data-tier applications (DAC and .BACPAC) can use Azure AD authentication.
110112
- Beginning with version 15.0.1, [sqlcmd utility](/sql/tools/sqlcmd-utility?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json&view=azure-sqldw-latest) and [bcp utility](/sql/tools/bcp-utility?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json&view=azure-sqldw-latest) support Active Directory Interactive authentication with MFA.
@@ -113,7 +115,7 @@ The following authentication methods are supported for Azure AD server principal
113115

114116
## Next steps
115117

116-
For an overview of access and control in SQL Analytics, see [SQL Analytics access control](../sql/access-control.md). To learn more about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx). Additional information about database roles, can be found in the [Database roles](https://msdn.microsoft.com/library/ms189121.aspx) article.
118+
For an overview of access and control in Synapse SQL, see [Synapse SQL access control](../sql/access-control.md). To learn more about database principals, see [Principals](https://msdn.microsoft.com/library/ms181127.aspx). Additional information about database roles, can be found in the [Database roles](https://msdn.microsoft.com/library/ms189121.aspx) article.
117119

118120

119121
<!--Image references-->

articles/synapse-analytics/sql/get-started-power-bi-professional.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer: jrasnick, carlrab
1212
---
1313

1414

15-
# Connect to SQL Analytics with Power BI Professional
15+
# Connect to Synapse SQL with Power BI Professional
1616

1717
> [!div class="op_single_selector"]
1818
>

articles/synapse-analytics/sql/mfa-authentication.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Using Multi-factor AAD authentication
3-
description: SQL Analytics support connections from SQL Server Management Studio (SSMS) using Active Directory Universal Authentication.
3+
description: Synapse SQL support connections from SQL Server Management Studio (SSMS) using Active Directory Universal Authentication.
44
services: synapse-analytics
55
author: vvasic-msft
66
ms.service: synapse-analytics
@@ -10,9 +10,9 @@ ms.author: vvasic
1010
ms.reviewer: jrasnick
1111
---
1212

13-
# Using Multi-factor AAD authentication with SQL Analytics (SSMS support for MFA)
13+
# Using Multi-factor AAD authentication with Synapse SQL (SSMS support for MFA)
1414

15-
SQL Analytics support connections from SQL Server Management Studio (SSMS) using *Active Directory Universal Authentication*.
15+
Synapse SQL support connections from SQL Server Management Studio (SSMS) using *Active Directory Universal Authentication*.
1616

1717
This article discusses the differences between the various authentication options, and also the limitations associated with using Universal Authentication.
1818

@@ -66,7 +66,7 @@ If you are running SSMS 18.x or later then the AD domain name or tenant ID is no
6666
![mfa-tenant-ssms](./media/mfa-authentication/mfa-no-tenant-ssms.png)
6767

6868
### Azure AD business to business support
69-
Azure AD users supported for Azure AD B2B scenarios as guest users (see [What is Azure B2B collaboration](../../active-directory/b2b/what-is-b2b.md?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json) can connect to SQL Analytics only as part of members of a group created in current Azure AD and mapped manually using the Transact-SQL `CREATE USER` statement in a given database.
69+
Azure AD users supported for Azure AD B2B scenarios as guest users (see [What is Azure B2B collaboration](../../active-directory/b2b/what-is-b2b.md?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json) can connect to Synapse SQL only as part of members of a group created in current Azure AD and mapped manually using the Transact-SQL `CREATE USER` statement in a given database.
7070

7171
For example, if `[email protected]` is invited to Azure AD `contosotest` (with the Azure Ad domain `contosotest.onmicrosoft.com`), an Azure AD group, such as `usergroup` must be created in the Azure AD that contains the `[email protected]` member. Then, this group must be created for a specific database (that is, MyDatabase) by Azure AD SQL admin or Azure AD DBO by executing a Transact-SQL `CREATE USER [usergroup] FROM EXTERNAL PROVIDER` statement.
7272

@@ -76,7 +76,7 @@ The usergroup, by default, has only the connect permission and any further data
7676

7777
Note that user `[email protected]` as a guest user must check the box and add the AD domain name `contosotest.onmicrosoft.com` in the SSMS **Connection Property** dialog box. The **AD domain name or tenant ID** option is only supported for the Universal with MFA connection options, otherwise it is greyed out.
7878

79-
## Universal Authentication limitations for SQL Analytics
79+
## Universal Authentication limitations for Synapse SQL
8080

8181
- SSMS and SqlPackage.exe are the only tools currently enabled for MFA through Active Directory Universal Authentication.
8282
- SSMS version 17.2, supports multi-user concurrent access using Universal Authentication with MFA. Version 17.0 and 17.1, restricted a login for an instance of SSMS using Universal Authentication to a single Azure Active Directory account. To log in as another Azure AD account, you must use another instance of SSMS. (This restriction is limited to Active Directory Universal Authentication; you can log in to different servers using Active Directory Password Authentication, Active Directory Integrated Authentication, or SQL Server Authentication).
@@ -87,5 +87,5 @@ Note that user `[email protected]` as a guest user must check the box and add the
8787
- The Active Directory Authentication Library (ADAL) version for Universal authentication was updated to its latest ADAL.dll 3.13.9 available released version. See [Active Directory Authentication Library 3.14.1](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory/).
8888

8989
## Next steps
90-
For more information, see the [Connect to SQL Analytics with SQL Server Management Studio](get-started-ssms.md) article.
90+
For more information, see the [Connect to Synapse SQL with SQL Server Management Studio](get-started-ssms.md) article.
9191

articles/synapse-analytics/sql/on-demand-workspace-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: SQL on-demand (preview)
3-
description: Learn about SQL Analytics on-demand in Azure Synapse Analytics.
3+
description: Learn about Synapse SQL on-demand in Azure Synapse Analytics.
44
services: sql-datawarehouse
55
author: vvasic-msft
66
ms.service: synapse-analytics
@@ -27,7 +27,7 @@ If you need to explore data in the data lake, gain insights from it or optimize
2727

2828
- Basic discovery and exploration - Quickly reason about the data in various formats (Parquet, CSV, JSON) in your data lake, so you can plan how to extract insights from it.
2929
- Logical data warehouse – Provide a relational abstraction on top of raw or disparate data without relocating and transforming data, allowing always up-to-date view of your data.
30-
- Data transformation - Simple, scalable, and performant way to transform data in the lake using T-SQL, so it can fed to BI and other tools, or loaded into a relational data store (SQL Analytics databases, Azure SQL Database, etc.).
30+
- Data transformation - Simple, scalable, and performant way to transform data in the lake using T-SQL, so it can fed to BI and other tools, or loaded into a relational data store (Synapse SQL databases, Azure SQL Database, etc.).
3131

3232
Different professional roles can benefit from SQL on-demand:
3333

@@ -42,7 +42,7 @@ SQL on-demand endpoint is provided within every Azure Synapse workspace. You can
4242

4343
## Client tools
4444

45-
SQL on-demand enables existing SQL ad-hoc querying and business intelligence tools to tap into the data lake. As it provides familiar T-SQL syntax, any tool capable to establish TDS connection SQL offerings can [connect to and query SQL Analytics](connect-overview.md) on-demand. You can connect with Azure Data Studio and run ad-hoc queries or connect with Power BI to gain insights in a matter of minutes.
45+
SQL on-demand enables existing SQL ad-hoc querying and business intelligence tools to tap into the data lake. As it provides familiar T-SQL syntax, any tool capable to establish TDS connection SQL offerings can [connect to and query Synapse SQL](connect-overview.md) on-demand. You can connect with Azure Data Studio and run ad-hoc queries or connect with Power BI to gain insights in a matter of minutes.
4646

4747
At this moment, latest version of Azure Data Studio is fully supported. Latest version of SSMS can be used to connect and query but is not supported yet. It will be fully supported until GA. Please make sure you use latest versions of tools.
4848

0 commit comments

Comments
 (0)