You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-firewall-configure.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,30 +1,29 @@
1
1
---
2
2
title: IP firewall rules
3
-
description: Configure server-level IP firewall rules for a SQL database or SQL Data Warehouse firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
3
+
description: Configure server-level IP firewall rules for a SQL database or Azure Synapse Analytics firewall. Manage access and configure database-level IP firewall rules for a single or pooled database.
4
4
services: sql-database
5
5
ms.service: sql-database
6
6
ms.subservice: security
7
-
titleSuffix: Azure SQL Database and SQL Data Warehouse
8
-
ms.custom:
7
+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
9
8
ms.devlang:
10
9
ms.topic: conceptual
11
10
author: VanMSFT
12
11
ms.author: vanto
13
12
ms.reviewer: carlrab
14
13
ms.date: 03/18/2019
15
14
---
16
-
# Azure SQL Database and Azure SQL Data Warehouse IP firewall rules
15
+
# Azure SQL Database and Azure Synapse Analytics IP firewall rules
17
16
18
17
> [!NOTE]
19
-
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure SQL Data Warehouse databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and SQL Data Warehouse.
18
+
> This article applies to Azure SQL servers, and to both Azure SQL Database and Azure Synapse Analytics databases on an Azure SQL server. For simplicity, *SQL Database* is used to refer to both SQL Database and Azure Synapse.
20
19
21
20
> [!IMPORTANT]
22
21
> This article does *not* apply to *Azure SQL Database Managed Instance*. For information about network configuration, see [Connect your application to Azure SQL Database Managed Instance](sql-database-managed-instance-connect-app.md).
23
22
24
23
When you create a new Azure SQL server named *mysqlserver*, for example, the SQL Database firewall blocks all access to the public endpoint for the server (which is accessible at *mysqlserver.database.windows.net*).
25
24
26
25
> [!IMPORTANT]
27
-
> SQL Data Warehouse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
26
+
> Azure Synapse only supports server-level IP firewall rules. It doesn't support database-level IP firewall rules.
28
27
29
28
## How the firewall works
30
29
Connection attempts from the internet and Azure must pass through the firewall before they reach your SQL server or SQL database, as the following diagram shows.
@@ -247,7 +246,7 @@ Consider the following points when access to the SQL Database service doesn't be
247
246
248
247
-**The login isn't authorized, or an incorrect password was used:**
249
248
250
-
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and SQL Data Warehouse](sql-database-manage-logins.md).
249
+
If a login doesn't have permissions on the SQL Database server or the password is incorrect, the connection to the server is denied. Creating a firewall setting only gives clients an *opportunity* to try to connect to your server. The client must still provide the necessary security credentials. For more information about preparing logins, see [Controlling and granting database access to SQL Database and Azure Synapse](sql-database-manage-logins.md).
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-networkaccess-overview.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Network Access Controls
3
-
description: Overview of network access controls for Azure SQL Database and Data Warehouse to manage access, and configure a single or pooled database.
3
+
description: Overview of network access controls for Azure SQL Database and Azure Synapse Analytics to manage access, and configure a single or pooled database.
4
4
services: sql-database
5
5
ms.service: sql-database
6
6
ms.subservice: security
7
-
titleSuffix: Azure SQL Database and SQL Data Warehouse
7
+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
8
8
ms.custom:
9
9
ms.devlang:
10
10
ms.topic: conceptual
@@ -14,10 +14,10 @@ ms.reviewer: vanto
14
14
ms.date: 03/09/2020
15
15
---
16
16
17
-
# Azure SQL Database and Data Warehouse network access controls
> This article applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.
20
+
> This article applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse Analytics.
21
21
22
22
> [!IMPORTANT]
23
23
> This article does *not* apply to **Azure SQL Database Managed Instance**. for more information about the networking configuration, see [connecting to a Managed Instance](sql-database-managed-instance-connect-app.md) .
@@ -51,7 +51,7 @@ You can also change this setting via the firewall pane after the Azure SQL Serve
51
51
52
52
When set to **ON** Azure SQL Server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
53
53
54
-
In many cases, the **ON** setting is more permissive than what most customers want. They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
54
+
In many cases, the **ON** setting is more permissive than what most customers want. They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to SQL Database via an Azure IP address.
55
55
56
56
### Import Export Service
57
57
Import Export Service does not work when **Allow access to Azure services** is set to **OFF**. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
@@ -60,7 +60,7 @@ Import Export Service does not work when **Allow access to Azure services** is s
60
60
To use the Data sync feature with **Allow access to Azure services** set to **OFF**, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
61
61
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
62
62
63
-
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region
63
+
Use the following PowerShell script to generate the IP addresses corresponding to SQL service tag for West US region
> Get-AzNetworkServiceTag returns the global range for Sql Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
79
+
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
80
80
81
81
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation and this needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-private-endpoint-overview.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,27 +3,27 @@ title: Private Link
3
3
description: Overview of Private endpoint feature
4
4
author: rohitnayakmsft
5
5
ms.author: rohitna
6
-
titleSuffix: Azure SQL Database and SQL Data Warehouse
6
+
titleSuffix: Azure SQL Database and Azure Synapse Analytics
7
7
ms.service: sql-database
8
8
ms.topic: overview
9
9
ms.reviewer: vanto
10
10
ms.date: 03/09/2020
11
11
---
12
12
13
-
# Private Link for Azure SQL Database and Data Warehouse
13
+
# Private Link for Azure SQL Database and Azure Synapse Analytics
14
14
15
15
Private Link allows you to connect to various PaaS services in Azure via a **private endpoint**. For a list of PaaS services that support Private Link functionality, go to the [Private Link Documentation](../private-link/index.yml) page. A private endpoint is a private IP address within a specific [VNet](../virtual-network/virtual-networks-overview.md) and Subnet.
16
16
17
17
> [!IMPORTANT]
18
-
> This article applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse. This article does *not* apply to a **managed instance** deployment in Azure SQL Database.
18
+
> This article applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse Analytics. This article does *not* apply to a **managed instance** deployment in Azure SQL Database.
19
19
20
20
## Data exfiltration prevention
21
21
22
22
Data exfiltration in Azure SQL Database is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
23
23
24
24
Consider a scenario with a user running SQL Server Management Studio (SSMS) inside an Azure VM connecting to a SQL Database. This SQL Database is in the West US data center. The example below shows how to limit access with public endpoints on SQL Database using network access controls.
25
25
26
-
1. Disable all Azure service traffic to SQL Database via the public endpoint by setting Allow Azure Services to **OFF**. Ensure no IP addresses are allowed in the server and database level firewall rules. For more information, see [Azure SQL Database and Data Warehouse network access controls](sql-database-networkaccess-overview.md).
26
+
1. Disable all Azure service traffic to SQL Database via the public endpoint by setting Allow Azure Services to **OFF**. Ensure no IP addresses are allowed in the server and database level firewall rules. For more information, see [Azure SQL Database and Azure Synapse Analytics network access controls](sql-database-networkaccess-overview.md).
27
27
1. Only allow traffic to the SQL Database using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](sql-database-vnet-service-endpoint-rule-overview.md) and [VNet firewall rules](sql-database-firewall-configure.md).
28
28
1. On the Azure VM, narrow down the scope of outgoing connection by using [Network Security Groups (NSGs)](../virtual-network/manage-network-security-group.md) and Service Tags as follows
29
29
- Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to SQL Database in West US
@@ -138,7 +138,6 @@ Nmap done: 256 IP addresses (1 host up) scanned in 207.00 seconds
138
138
139
139
The result shows that one IP address is up; which corresponds to the IP address for the private endpoint.
140
140
141
-
142
141
### Check Connectivity using SQL Server Management Studio (SSMS)
143
142
> [!NOTE]
144
143
> Use the **Fully Qualified Domain Name (FQDN)** of the server in connection strings for your clients. Any login attempts made directly to the IP address shall fail. This behavior is by design, since private endpoint routes traffic to the SQL Gateway in the region and the FQDN needs to be specified for logins to succeed.
@@ -170,11 +169,9 @@ To establish connectivity from an on-premises environment to the SQL Database, c
## Connecting from an Azure SQL Data Warehouse to Azure Storage using Polybase
174
-
175
-
PolyBase is commonly used to load data into Azure SQL Data Warehouse from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure SQL Data Warehouse connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
176
-
172
+
## Connecting from Azure Synapse Analytics to Azure Storage using Polybase
177
173
174
+
PolyBase is commonly used to load data into Azure Synapse Analytics from Azure Storage accounts. If the Azure Storage account that you are loading data from limits access only to a set of VNet-subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase to the account will break. For enabling both PolyBase import and export scenarios with Azure Synapse Analytics connecting to Azure Storage that's secured to a VNet, follow the steps provided [here](sql-database-vnet-service-endpoint-rule-overview.md#impact-of-using-vnet-service-endpoints-with-azure-storage).
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-security-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Microsoft Azure SQL Database provides a relational database service for cloud an
24
24
25
25
### IP firewall rules
26
26
27
-
IP firewall rules grant access to databases based on the originating IP address of each request. For more information, see [Overview of Azure SQL Database and SQL Data Warehouse firewall rules](sql-database-firewall-configure.md).
27
+
IP firewall rules grant access to databases based on the originating IP address of each request. For more information, see [Overview of Azure SQL Database and Azure Synapse Analytics firewall rules](sql-database-firewall-configure.md).
28
28
29
29
### Virtual network firewall rules
30
30
@@ -50,7 +50,7 @@ Authentication is the process of proving the user is who they claim to be. Azure
50
50
51
51
-**Azure Active Directory authentication**:
52
52
53
-
Azure Active Directory authentication is a mechanism of connecting to [Azure SQL Database](sql-database-technical-overview.md) and [SQL Data Warehouse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md) by using identities in Azure Active Directory (Azure AD). Azure AD authentication allows administrators to centrally manage the identities and permissions of database users along with other Microsoft services in one central location. This includes the minimization of password storage and enables centralized password rotation policies.
53
+
Azure Active Directory authentication is a mechanism of connecting to [Azure SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md) by using identities in Azure Active Directory (Azure AD). Azure AD authentication allows administrators to centrally manage the identities and permissions of database users along with other Microsoft services in one central location. This includes the minimization of password storage and enables centralized password rotation policies.
54
54
55
55
A server admin called the **Active Directory administrator** must be created to use Azure AD authentication with SQL Database. For more information, see [Connecting to SQL Database By Using Azure Active Directory Authentication](sql-database-aad-authentication.md). Azure AD authentication supports both managed and federated accounts. The federated accounts support Windows users and groups for a customer domain federated with Azure AD.
0 commit comments