Skip to content

Commit f39b15a

Browse files
committed
Updating the doc for the new features added
1 parent 13a7a39 commit f39b15a

18 files changed

+86
-86
lines changed

articles/mariadb/concepts-data-access-security-private-link.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Private Link for Azure Database for MariaDB
2+
title: Private Link - Azure Database for MariaDB
33
description: Learn how Private link works for Azure Database for MariaDB.
44
author: kummanish
55
ms.author: manishku
@@ -10,7 +10,7 @@ ms.date: 03/10/2020
1010

1111
# Private Link for Azure Database for MariaDB
1212

13-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside your private Virtual Network (VNet). The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
13+
Private Link allows you to create private endpoints for Azure Database for MariaDB and so brings Azure services inside your private Virtual Network (VNet). The private endpoint exposes a private IP you can use to connect to your Azure Database for MariaDB database server just like any other resource in the VNet.
1414

1515
For a list to PaaS services that support Private Link functionality, review the Private Link [documentation](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
1616

@@ -46,39 +46,39 @@ With Private Link, you can enable cross-premises access to the private endpoint
4646

4747
### Creation Process
4848

49-
Private Endpoints are required to enable Private Link. This can be done using the following how-to guides.
49+
private endpoints are required to enable Private Link. This can be done using the following how-to guides.
5050

5151
* [Azure portal](https://docs.microsoft.com/azure/mariadb/howto-configure-privatelink-portal)
5252
* [CLI](https://docs.microsoft.com/azure/mariadb/howto-configure-privatelink-cli)
5353

5454
### Approval Process
5555

56-
Once the network admin creates the Private Endpoint (PE), the admin can manage the Private Endpoint Connection (PEC) to Azure Database for MariaDB.
56+
Once the network admin creates the private endpoint (PE), the admin can manage the private endpoint Connection (PEC) to Azure Database for MariaDB. This separation of duties between the network admin and the DBA is helpful for management of the Azure Database for MariaDB connectivity.
5757

5858
* Navigate to the Azure Database for MariaDB server resource in the Azure portal.
59-
* Select the Private endpoint connections in the left pane
60-
* Shows a list of all Private Endpoint Connections (PECs)
61-
* Corresponding Private Endpoint (PE) created
59+
* Select the private endpoint connections in the left pane
60+
* Shows a list of all private endpoint Connections (PECs)
61+
* Corresponding private endpoint (PE) created
6262

63-
![select the Private endpoint portal](media/concepts-data-access-and-security-private-link/select-private-link-portal.png)
63+
![select the private endpoint portal](media/concepts-data-access-and-security-private-link/select-private-link-portal.png)
6464

6565
* Select an individual PEC from the list by selecting it.
6666

67-
![select the Private endpoint pending approval](media/concepts-data-access-and-security-private-link/select-private-link.png)
67+
![select the private endpoint pending approval](media/concepts-data-access-and-security-private-link/select-private-link.png)
6868

6969
* The MariaDB server admin can choose to approve or reject a PEC and optionally add a short text response.
7070

71-
![select the Private endpoint message](media/concepts-data-access-and-security-private-link/select-private-link-message.png)
71+
![select the private endpoint message](media/concepts-data-access-and-security-private-link/select-private-link-message.png)
7272

7373
* After approval or rejection, the list will reflect the appropriate state along with the response text
7474

75-
![select the Private endpoint final state](media/concepts-data-access-and-security-private-link/show-private-link-approved-connection.png)
75+
![select the private endpoint final state](media/concepts-data-access-and-security-private-link/show-private-link-approved-connection.png)
7676

7777
## Use cases of Private Link for Azure Database for MariaDB
7878

79-
Clients can connect to the Private endpoint from the same VNet, peered VNet in same region, or via VNet-to-VNet connection across regions. Additionally, clients can connect from on-premises using ExpressRoute, private peering, or VPN tunneling. Below is a simplified diagram showing the common use cases.
79+
Clients can connect to the private endpoint from the same VNet, peered VNet in same region, or via VNet-to-VNet connection across regions. Additionally, clients can connect from on-premises using ExpressRoute, private peering, or VPN tunneling. Below is a simplified diagram showing the common use cases.
8080

81-
![select the Private endpoint overview](media/concepts-data-access-and-security-private-link/show-private-link-overview.png)
81+
![select the private endpoint overview](media/concepts-data-access-and-security-private-link/show-private-link-overview.png)
8282

8383
### Connecting from an Azure VM in Peered Virtual Network (VNet)
8484
Configure [VNet peering](https://docs.microsoft.com/azure/virtual-network/tutorial-connect-virtual-networks-powershell) to establish connectivity to the Azure Database for MariaDB from an Azure VM in a peered VNet.
@@ -105,9 +105,9 @@ The following situations and outcomes are possible when you use Private Link in
105105

106106
## Deny public access for Azure Database for MariaDB
107107

108-
While Private Link allows access via private endpoint only, customer can use still use the public end points via [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-security-vnet.md) in such cases where they may need a mix of private and public connectivity. However, if you want to rely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints by setting the **Deny Public Network Access** configuration on the database server.
108+
If you want to rely completely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints ([firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-security-vnet.md)) by setting the **Deny Public Network Access** configuration on the database server.
109109

110-
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO* clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and VNet service endpoint rule
110+
When this setting is set to *YES*, only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO*, clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint settings. Additionally, once the value of the Private network access is set, you cannot add and/or update existing firewall and VNet service endpoint rules.
111111

112112
> [!Note]
113113
> This setting does not have any impact on the SSL and TLS configurations for your Azure Database for MariaDB.

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ To learn how to enable or disable SSL connection when developing application, re
2222

2323
## TLS connectivity in Azure Database for MariaDB
2424

25-
Azure Database for MariaDB supports privacy and data integrity over communications as clients connect to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and your client applications and helps adhere to compliance requirements.
25+
Azure Database for MariaDB supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
2626

2727
### TLS settings
2828

29-
Security conscious customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MariaDB. To use the TLS option, use the **minumumTlsVersion** option setting. The following values are allowed for this option setting:
29+
Azure Database for MariaDB provides the ability to enforce the TLS version for the client connections. To use the TLS option, use the **Minimum TLS version** option setting. The following values are allowed for this option setting:
3030

3131
| Minimum TLS Setting | TLS Version supported |
3232
|:---------------------------------|-------------------------------------:|
@@ -36,12 +36,12 @@ Security conscious customers now have the ability to enforce the TLS version for
3636
| TLS1_2 | TLS version 1.2 and higher |
3737

3838

39-
For example, setting this Minimum TLS setting version to TLS 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2+. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
39+
For example, setting this Minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
4040

4141
> [!Note]
4242
> Azure Database for MariaDB defaults to TLS being disabled for all new servers.
4343
>
44-
> Currently the TLS version supported for Azure Database for MariaDB are TLS 1.0, TLS 1.1, TLS 1.2.
44+
> Currently the TLS versions supported byAzure Database for MariaDB are TLS 1.0, 1.1, and 1.2.
4545
4646
To learn how to set the TLS setting for your Azure Database for MariaDB, refer to [How to configure TLS setting](howto-tls-configurations.md).
4747

articles/mariadb/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Private Link for Azure Database for MariaDB CLI setup method
2+
title: Private Link - Azure cli - Azure Database for MariaDB
33
description: Learn how to configure private link for Azure Database for MariaDB from Azure CLI
44
author: kummanish
55
ms.author: manishku

articles/mariadb/howto-configure-privatelink-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Private Link for Azure Database for MariaDB portal setup method
2+
title: Private Link - Azure CLI - Azure Database for MariaDB
33
description: Learn how to configure private link for Azure Database for MariaDB from Azure portal
44
author: kummanish
55
ms.author: manishku

articles/mariadb/howto-deny-public-network-access.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Deny Public Network Access in Azure Database for MariaDB using Azure portal
2+
title: Deny Public Network Access - Azure portal - Azure Database for MariaDB
33
description: Learn how to configure Deny Public Network Access using Azure portal for your Azure Database for MariaDB
44
author: kummanish
55
ms.author: manishku
@@ -10,7 +10,7 @@ ms.date: 03/10/2020
1010

1111
# Deny Public Network Access in Azure Database for MariaDB using Azure portal
1212

13-
This article describes how you can configure an Azure Database for MariaDB server to deny all public configurations and allow only private endpoints to go through to enhance the network security.
13+
This article describes how you can configure an Azure Database for MariaDB server to deny all public configurations and allow only connections through private endpoints to further enhance the network security.
1414

1515
## Prerequisites
1616

@@ -24,9 +24,9 @@ Follow these steps to set MariaDB server Deny Public Network Access:
2424

2525
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
2626

27-
* On the MariaDB server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
27+
* On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
2828

29-
* In the Deny Public Network Access, select **Yes** to enable deny public access for your MariaDB server.
29+
* In Deny Public Network Access, select **Yes** to enable deny public access for your MariaDB server.
3030

3131
![Azure Database for MariaDB Deny network access](./media/howto-deny-public-network-access/deny-public-network-access.PNG)
3232

articles/mariadb/howto-tls-configurations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: TLS configuration in Azure Database for MariaDB using Azure portal
2+
title: TLS configuration - Azure portal - Azure Database for MariaDB
33
description: Learn how to set TLS configuration using Azure portal for your Azure Database for MariaDB
44
author: kummanish
55
ms.author: manishku
@@ -12,7 +12,7 @@ ms.date: 03/10/2020
1212

1313
This article describes how you can configure an Azure Database for MariaDB server to enforce connections for a minimum TLS version to go through and deny all connections with lower TLS version thereby enhancing the network security.
1414

15-
Security conscious customers now have the ability to enforce TLS version for connecting to their Azure Database for MariaDB. Customers now have a choice to set the minimal TLS version for their database server. For example, setting this Minimum TLS version to 1.0 means you shall allow clients connecting using TLS 1.0,1.1 and 1.2. Alternatively, setting this to 1.2 means that you only allow clients connecting using TLS 1.2 and all incoming connections with TLS 1.0 and TLS 1.1 will be rejected.
15+
Customers now have the ability to enforce TLS version for connecting to their Azure Database for MariaDB by setting the minimal TLS version for their database server. For example, setting the minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
1616

1717
## Prerequisites
1818

@@ -26,9 +26,9 @@ Follow these steps to set MariaDB server minimum TLS version:
2626

2727
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
2828

29-
* On the MariaDB server page, under **Settings** heading, click **Connection security** to open the connection security configuration page.
29+
* On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
3030

31-
* In the **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MariaDB server.
31+
* In **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MariaDB server.
3232

3333
![Azure Database for MariaDB TLS configuration](./media/howto-tls-configurations/tls-configurations.png)
3434

0 commit comments

Comments
 (0)