Skip to content

Commit f0bfeec

Browse files
authored
Merge pull request #111431 from julieMSFT/2020414_privatelink
security rebranding
2 parents 9c5cba5 + 5f98b85 commit f0bfeec

7 files changed

+39
-43
lines changed

articles/sql-database/sql-database-firewall-configure.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,29 @@
11
---
22
title: IP firewall rules
3-
description: Configure server-level IP firewall rules for a SQL database or SQL Data Warehouse firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
3+
description: Configure server-level IP firewall rules for a SQL database or Azure Synapse Analytics firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
titleSuffix: Azure SQL Database and SQL Data Warehouse
8-
ms.custom:
7+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
98
ms.devlang:
109
ms.topic: conceptual
1110
author: VanMSFT
1211
ms.author: vanto
1312
ms.reviewer: carlrab
1413
ms.date: 03/18/2019
1514
---
16-
# Azure SQL Database and Azure SQL Data Warehouse IP firewall rules
15+
# Azure SQL Database and Azure Synapse Analytics IP firewall rules
1716

1817
> [!NOTE]
19-
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure SQL Data Warehouse databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and SQL Data Warehouse.
18+
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure Synapse Analytics databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and Azure Synapse.
2019
2120
> [!IMPORTANT]
2221
> This article does *not* apply to *Azure SQL Database Managed Instance*. For information about network configuration, see [Connect your application to Azure SQL Database Managed Instance](sql-database-managed-instance-connect-app.md).
2322
2423
When you create a new Azure SQL server named *mysqlserver*, for example, the SQL Database firewall blocks all access to the public endpoint for the server (which is accessible at *mysqlserver.database.windows.net*).
2524

2625
> [!IMPORTANT]
27-
> SQL Data Warehouse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
26+
> Azure Synapse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
2827
2928
## How the firewall works
3029
Connection attempts from the internet and Azure must pass through the firewall before they reach your SQL server or SQL database, as the following diagram shows.
@@ -247,7 +246,7 @@ Consider the following points when access to the SQL Database service doesn't be
247246

248247
- **The login isn't authorized, or an incorrect password was used:**
249248

250-
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and SQL Data Warehouse](sql-database-manage-logins.md).
249+
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and Azure Synapse](sql-database-manage-logins.md).
251250

252251
- **Dynamic IP address:**
253252

articles/sql-database/sql-database-networkaccess-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Network Access Controls
3-
description: Overview of network access controls for Azure SQL Database and Data Warehouse to manage access, and configure a single or pooled database.
3+
description: Overview of network access controls for Azure SQL Database and Azure Synapse Analytics to manage access, and configure a single or pooled database.
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
titleSuffix: Azure SQL Database and SQL Data Warehouse
7+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
88
ms.custom:
99
ms.devlang:
1010
ms.topic: conceptual
@@ -14,10 +14,10 @@ ms.reviewer: vanto
1414
ms.date: 03/09/2020
1515
---
1616

17-
# Azure SQL Database and Data Warehouse network access controls
17+
# Azure SQL Database and Azure Synapse Analytics network access controls
1818

1919
> [!NOTE]
20-
> This article applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
20+
> This article applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse Analytics.
2121
2222
> [!IMPORTANT]
2323
> This article does *not* apply to **Azure SQL Database Managed Instance**. for more information about the networking configuration, see [connecting to a Managed Instance](sql-database-managed-instance-connect-app.md) .
@@ -51,7 +51,7 @@ You can also change this setting via the firewall pane after the Azure SQL Serve
5151

5252
When set to **ON** Azure SQL Server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
5353

54-
In many cases, the **ON** setting is more permissive than what most customers want. They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
54+
In many cases, the **ON** setting is more permissive than what most customers want. They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to SQL Database via an Azure IP address.
5555

5656
### Import Export Service
5757
Import Export Service does not work when **Allow access to Azure services** is set to **OFF**. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
@@ -60,7 +60,7 @@ Import Export Service does not work when **Allow access to Azure services** is s
6060
To use the Data sync feature with **Allow access to Azure services** set to **OFF**, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
6161
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
6262

63-
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region
63+
Use the following PowerShell script to generate the IP addresses corresponding to SQL service tag for West US region
6464
```powershell
6565
PS C:\> $serviceTags = Get-AzNetworkServiceTag -Location eastus2
6666
PS C:\> $sql = $serviceTags.Values | Where-Object { $_.Name -eq "Sql.WestUS" }
@@ -76,7 +76,7 @@ PS C:\> $sql.Properties.AddressPrefixes
7676
```
7777

7878
> [!TIP]
79-
> Get-AzNetworkServiceTag returns the global range for Sql Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
79+
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
8080
8181
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation and this needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this
8282
```powershell

articles/sql-database/sql-database-private-endpoint-overview.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,27 +3,27 @@ title: Private Link
33
description: Overview of Private endpoint feature
44
author: rohitnayakmsft
55
ms.author: rohitna
6-
titleSuffix: Azure SQL Database and SQL Data Warehouse
6+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
77
ms.service: sql-database
88
ms.topic: overview
99
ms.reviewer: vanto
1010
ms.date: 03/09/2020
1111
---
1212

13-
# Private Link for Azure SQL Database and Data Warehouse
13+
# Private Link for Azure SQL Database and Azure Synapse Analytics
1414

1515
Private Link allows you to connect to various PaaS services in Azure via a **private endpoint**. For a list of PaaS services that support Private Link functionality, go to the [Private Link Documentation](../private-link/index.yml) page. A private endpoint is a private IP address within a specific [VNet](../virtual-network/virtual-networks-overview.md) and Subnet.
1616

1717
> [!IMPORTANT]
18-
> This article applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse. This article does *not* apply to a **managed instance** deployment in Azure SQL Database.
18+
> This article applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse Analytics. This article does *not* apply to a **managed instance** deployment in Azure SQL Database.
1919
2020
## Data exfiltration prevention
2121

2222
Data exfiltration in Azure SQL Database is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
2323

2424
Consider a scenario with a user running SQL Server Management Studio (SSMS) inside an Azure VM connecting to a SQL Database. This SQL Database is in the West US data center. The example below shows how to limit access with public endpoints on SQL Database using network access controls.
2525

26-
1. Disable all Azure service traffic to SQL Database via the public endpoint by setting Allow Azure Services to **OFF**. Ensure no IP addresses are allowed in the server and database level firewall rules. For more information, see [Azure SQL Database and Data Warehouse network access controls](sql-database-networkaccess-overview.md).
26+
1. Disable all Azure service traffic to SQL Database via the public endpoint by setting Allow Azure Services to **OFF**. Ensure no IP addresses are allowed in the server and database level firewall rules. For more information, see [Azure SQL Database and Azure Synapse Analytics network access controls](sql-database-networkaccess-overview.md).
2727
1. Only allow traffic to the SQL Database using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](sql-database-vnet-service-endpoint-rule-overview.md) and [VNet firewall rules](sql-database-firewall-configure.md).
2828
1. On the Azure VM, narrow down the scope of outgoing connection by using [Network Security Groups (NSGs)](../virtual-network/manage-network-security-group.md) and Service Tags as follows
2929
- Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to SQL Database in West US
@@ -138,7 +138,6 @@ Nmap done: 256 IP addresses (1 host up) scanned in 207.00 seconds
138138

139139
The result shows that one IP address is up; which corresponds to the IP address for the private endpoint.
140140

141-
142141
### Check Connectivity using SQL Server Management Studio (SSMS)
143142
> [!NOTE]
144143
> Use the **Fully Qualified Domain Name (FQDN)** of the server in connection strings for your clients. Any login attempts made directly to the IP address shall fail. This behavior is by design, since private endpoint routes traffic to the SQL Gateway in the region and the FQDN needs to be specified for logins to succeed.
@@ -170,11 +169,9 @@ To establish connectivity from an on-premises environment to the SQL Database, c
170169
- [ExpressRoute circuit](../expressroute/expressroute-howto-linkvnet-portal-resource-manager.md)
171170

172171

173-
## Connecting from an Azure SQL Data Warehouse to Azure Storage using Polybase
174-
175-
PolyBase is commonly used to load data into Azure SQL Data Warehouse from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure SQL Data Warehouse connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
176-
172+
## Connecting from Azure Synapse Analytics to Azure Storage using Polybase
177173

174+
PolyBase is commonly used to load data into Azure Synapse Analytics from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure Synapse Analytics connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
178175

179176
## Next steps
180177

articles/sql-database/sql-database-security-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Microsoft Azure SQL Database provides a relational database service for cloud an
2424

2525
### IP firewall rules
2626

27-
IP firewall rules grant access to databases based on the originating IP address of each request. For more information, see [Overview of Azure SQL Database and SQL Data Warehouse firewall rules](sql-database-firewall-configure.md).
27+
IP firewall rules grant access to databases based on the originating IP address of each request. For more information, see [Overview of Azure SQL Database and Azure Synapse Analytics firewall rules](sql-database-firewall-configure.md).
2828

2929
### Virtual network firewall rules
3030

@@ -50,7 +50,7 @@ Authentication is the process of proving the user is who they claim to be. Azure
5050

5151
- **Azure Active Directory authentication**:
5252

53-
Azure Active Directory authentication is a mechanism of connecting to [Azure SQL Database](sql-database-technical-overview.md) and [SQL Data Warehouse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md) by using identities in Azure Active Directory (Azure AD). Azure AD authentication allows administrators to centrally manage the identities and permissions of database users along with other Microsoft services in one central location. This includes the minimization of password storage and enables centralized password rotation policies.
53+
Azure Active Directory authentication is a mechanism of connecting to [Azure SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md) by using identities in Azure Active Directory (Azure AD). Azure AD authentication allows administrators to centrally manage the identities and permissions of database users along with other Microsoft services in one central location. This includes the minimization of password storage and enables centralized password rotation policies.
5454

5555
A server admin called the **Active Directory administrator** must be created to use Azure AD authentication with SQL Database. For more information, see [Connecting to SQL Database By Using Azure Active Directory Authentication](sql-database-aad-authentication.md). Azure AD authentication supports both managed and federated accounts. The federated accounts support Windows users and groups for a customer domain federated with Azure AD.
5656

0 commit comments

Comments
 (0)