Skip to content

Commit fe71cfa

Browse files
committed
fixing more broken things
1 parent a6486e9 commit fe71cfa

File tree

9 files changed

+27
-27
lines changed

9 files changed

+27
-27
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32750,7 +32750,7 @@
3275032750
},
3275132751
{
3275232752
"source_path": "articles/sql-database/sql-database-security-attributes.md",
32753-
"redirect_url": "/azure/sql-database/sql-database-security-controls",
32753+
"redirect_url": "/azure/azure-sql/database/security-controls",
3275432754
"redirect_document_id": false
3275532755
},
3275632756
{

articles/analysis-services/tutorials/analysis-services-tutorial-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ For the remaining tasks, you use SSMS to connect to and manage your server.
5555
![Connect in SSMS](./media/analysis-services-tutorial-roles/aas-connect-ssms-auth.png)
5656

5757
> [!TIP]
58-
> Choosing Active Directory Universal with MFA Support is recommended. This type of authentication type supports [non-interactive and multi-factor authentication](../../azure-sql/).
58+
> Choosing Active Directory Universal with MFA Support is recommended. This type of authentication type supports [non-interactive and multi-factor authentication](../../azure-sql/mfa-authentication-ssms-overview.md).
5959
6060
3. In **Object Explorer**, expand to see server objects. Right-click to see server properties.
6161

articles/azure-sql/azure-sql-iaas-vs-paas-what-is-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Azure SQL Database offers the following deployment options:
7878

7979
### Azure SQL Managed Instance
8080

81-
[**Azure SQL Managed Instance**](managed-instance/sql-database-managed-instance.md) is a relational database-as-a-service (DBaaS) hosted in the Azure cloud that falls into the industry category of *Platform-as-a-Service (PaaS)*. Best for most migrations to the cloud. SQL Managed Instance is a collection of system and user databases with a shared set of resources that is lift-and-shift ready. Best for new applications or existing on-premises applications that want to use the latest stable SQL Server features and that are migrated to the cloud with minimal changes. A SQL Managed Instance is similar to an instance of the [Microsoft SQL Server database engine](https://docs.microsoft.com/sql/database-engine/sql-server-database-engine-overview) offering shared resources for databases and additional instance-scoped features. SQL Managed Instance supports database migration from on-premises with minimal to no database change. This option provides all of the PaaS benefits of Azure SQL Database but adds capabilities that were previously only available in SQL Server VMs. This includes a native virtual network (VNet) and near 100% compatibility with on-premises SQL Server. SQL Managed Instances provide full SQL Server access and feature compatibility for migrating SQL Servers to Azure.
81+
[**Azure SQL Managed Instance**](managed-instance/sql-managed-instance-paas-overview.md) is a relational database-as-a-service (DBaaS) hosted in the Azure cloud that falls into the industry category of *Platform-as-a-Service (PaaS)*. Best for most migrations to the cloud. SQL Managed Instance is a collection of system and user databases with a shared set of resources that is lift-and-shift ready. Best for new applications or existing on-premises applications that want to use the latest stable SQL Server features and that are migrated to the cloud with minimal changes. A SQL Managed Instance is similar to an instance of the [Microsoft SQL Server database engine](https://docs.microsoft.com/sql/database-engine/sql-server-database-engine-overview) offering shared resources for databases and additional instance-scoped features. SQL Managed Instance supports database migration from on-premises with minimal to no database change. This option provides all of the PaaS benefits of Azure SQL Database but adds capabilities that were previously only available in SQL Server VMs. This includes a native virtual network (VNet) and near 100% compatibility with on-premises SQL Server. SQL Managed Instances provide full SQL Server access and feature compatibility for migrating SQL Servers to Azure.
8282

8383
### SQL Server on Azure VM
8484

articles/azure-sql/database/failover-group-add-single-database-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ Create your failover group and add your database to it using the Azure portal.
6262
1. Select the database created in section 1, such as `mySampleDatabase`.
6363
1. Failover groups can be configured at the server level. Select the name of the server under **Server name** to open the settings for the server.
6464

65-
![Open server for database](./media/failover-group--add-single-database-tutorial/open-sql-db-server.png)
65+
![Open server for database](./media/failover-group-add-single-database-tutorial/open-sql-db-server.png)
6666

6767
1. Select **Failover groups** under the **Settings** pane, and then select **Add group** to create a new failover group.
6868

69-
![Add new failover group](./media/failover-group--add-single-database-tutorial/sqldb-add-new-failover-group.png)
69+
![Add new failover group](./media/failover-group-add-single-database-tutorial/sqldb-add-new-failover-group.png)
7070

7171
1. On the **Failover Group** page, enter or select the following values, and then select **Create**:
7272

@@ -80,11 +80,11 @@ Create your failover group and add your database to it using the Azure portal.
8080
> [!NOTE]
8181
> The server login and firewall settings must match that of your primary server.
8282
83-
![Create a secondary server for the failover group](./media/failover-group--add-single-database-tutorial/create-secondary-failover-server.png)
83+
![Create a secondary server for the failover group](./media/failover-group-add-single-database-tutorial/create-secondary-failover-server.png)
8484

8585
- **Databases within the group**: Once a secondary server is selected, this option becomes unlocked. Select it to **Select databases to add** and then choose the database you created in section 1. Adding the database to the failover group will automatically start the geo-replication process.
8686

87-
![Add SQL Database to failover group](./media/failover-group--add-single-database-tutorial/add-sqldb-to-failover-group.png)
87+
![Add SQL Database to failover group](./media/failover-group-add-single-database-tutorial/add-sqldb-to-failover-group.png)
8888

8989
# [PowerShell](#tab/azure-powershell)
9090

@@ -208,17 +208,17 @@ Test failover using the Azure portal.
208208
1. Select the database created in the section 2, such as `mySampleDatbase`.
209209
1. Select the name of the server under **Server name** to open the settings for the server.
210210

211-
![Open server for database](./media/failover-group--add-single-database-tutorial/open-sql-db-server.png)
211+
![Open server for database](./media/failover-group-add-single-database-tutorial/open-sql-db-server.png)
212212

213213
1. Select **Failover groups** under the **Settings** pane and then choose the failover group you created in section 2.
214214

215-
![Select the failover group from the portal](./media/failover-group--add-single-database-tutorial/select-failover-group.png)
215+
![Select the failover group from the portal](./media/failover-group-add-single-database-tutorial/select-failover-group.png)
216216

217217
1. Review which server is primary and which server is secondary.
218218
1. Select **Failover** from the task pane to failover your failover group containing your sample database.
219219
1. Select **Yes** on the warning that notifies you that TDS sessions will be disconnected.
220220

221-
![Fail over your failover group containing your SQL database](./media/failover-group--add-single-database-tutorial/failover-sql-db.png)
221+
![Fail over your failover group containing your SQL database](./media/failover-group-add-single-database-tutorial/failover-sql-db.png)
222222

223223
1. Review which server is now primary and which server is secondary. If fail over succeeded, the two servers should have swapped roles.
224224
1. Select **Failover** again to fail the servers back to their originally roles.

articles/azure-sql/database/move-resources-across-regions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This article provides a general workflow for moving resources to a different reg
5555
5656
### Prepare resources
5757

58-
1. Create a [failover group](failover-group--add-single-database-tutorial.md#2---create-the-failover-group) between the server of the source to the server of the target.
58+
1. Create a [failover group](failover-group-add-single-database-tutorial.md#2---create-the-failover-group) between the server of the source to the server of the target.
5959
1. Add the databases you want to move to the failover group.
6060
- Replication of all added databases will be initiated automatically. For more information, see [Best practices for using failover groups with single databases](auto-failover-group-overview.md#best-practices-for-sql-database).
6161

articles/azure-sql/mfa-authentication-ssms-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,12 @@ The following steps show how to connect using the latest SSMS.
3434
1. To connect using Universal Authentication, on the **Connect to Server** dialog box in SQL Server Management Studio (SSMS), select **Active Directory - Universal with MFA support**. (If you see **Active Directory Universal Authentication** you are not on the latest version of SSMS.)
3535
![1mfa-universal-connect][1]
3636
2. Complete the **User name** box with the Azure Active Directory credentials, in the format `[email protected]`.
37-
![1mfa-universal-connect-user](./media/ssms-mfa-authentication-configure/1mfa-universal-connect-user.png)
37+
![1mfa-universal-connect-user](./media/mfa-authentication-ssms-configure/1mfa-universal-connect-user.png)
3838
3. If you are connecting as a guest user, you no longer need to complete the AD domain name or tenant ID field for guest users because SSMS 18.x or later automatically recognizes it. For more information, see [Universal Authentication with SQL Database, SQL Managed Instance, and Azure Synapse (SSMS support for MFA)](mfa-authentication-ssms-overview.md).
39-
![mfa-no-tenant-ssms](./media/ssms-mfa-authentication-configure/mfa-no-tenant-ssms.png)
39+
![mfa-no-tenant-ssms](./media/mfa-authentication-ssms-configure/mfa-no-tenant-ssms.png)
4040

4141
However, If you are connecting as a guest user using SSMS 17.x or older, you must click **Options**, and on the **Connection Property** dialog box, and complete the **AD domain name or tenant ID** box.
42-
![mfa-tenant-ssms](./media/ssms-mfa-authentication-configure/mfa-tenant-ssms.png)
42+
![mfa-tenant-ssms](./media/mfa-authentication-ssms-configure/mfa-tenant-ssms.png)
4343

4444
4. Select **Options** and specify the database on the **Options** dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See [Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA)](mfa-authentication-ssms-overview.md). Then click **Connect**.
4545
5. When the **Sign in to your account** dialog box appears, provide the account and password of your Azure Active Directory identity. No password is required if a user is part of a domain federated with Azure AD.

articles/azure-sql/toc.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -107,35 +107,35 @@
107107
- name: Audit to storage account behind VNet or firewall
108108
href: database/audit-write-storage-account-behind-vnet-firewall.md
109109
- name: Audit log format
110-
href: sql-database-audit-log-format.md
110+
href: database/audit-log-format.md
111111

112112
- name: Security management
113113
items:
114114
- name: Advanced data security
115-
href: sql-database-advanced-data-security.md
115+
href: database/advanced-data-security.md
116116
- name: Data discovery and classification
117-
href: sql-database-data-discovery-and-classification.md
117+
href: database/data-discovery-and-classification-overview.md
118118
- name: Vulnerability assessment
119119
items:
120120
- name: Vulnerability assessment
121-
href: sql-vulnerability-assessment.md
121+
href: /database/sql-vulnerability-assessment.md
122122
- name: Storing VA scans behind firewalls and VNets
123-
href: sql-database-vulnerability-assessment-storage.md
123+
href: database/sql-database-vulnerability-assessment-storage.md
124124
- name: Advanced Threat Protection
125-
href: sql-database-threat-detection-overview.md
125+
href: database/threat-detection-overview.md
126126
- name: Security attributes
127-
href: sql-database-security-attributes.md
127+
href: database/security-controls.md
128128
- name: Connect and query
129-
href: sql-database-connect-query.md
129+
href: database/connect-query-content-reference-guide.md
130130
items:
131131
- name: Connect and run ad-hoc queries
132132
items:
133133
- name: Azure Data Studio
134134
href: https://docs.microsoft.com/sql/azure-data-studio/quickstart-sql-database?toc=/azure/sql-database/toc.json
135135
- name: SSMS
136-
href: sql-database-connect-query-ssms.md
136+
href: database/connect-query-ssms.md
137137
- name: Azure portal
138-
href: sql-database-connect-query-portal.md
138+
href: database/connect-query-portal.md
139139
- name: VS Code
140140
href: sql-database-connect-query-vscode.md
141141
- name: Connect and query from apps

articles/security/fundamentals/paas-applications-using-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Azure SQL Database can be configured to use one of two types of authentication:
4646
- Uses contained database users to authenticate identities at the database level.
4747
- Supports token-based authentication for applications connecting to SQL Database.
4848
- Supports domain federation with Active Directory Federation Services (ADFS) or native user/password authentication for a local Azure AD without domain synchronization.
49-
- Supports connections from SQL Server Management Studio that use Active Directory Universal Authentication, which includes [Multi-Factor Authentication (MFA)](/azure/active-directory/authentication/multi-factor-authentication). MFA includes strong authentication with a range of easy verification options — phone call, text message, smart cards with pin, or mobile app notification. For more information, see [Universal Authentication with SQL Database and SQL Data Warehouse](../../azure-sql/).
49+
- Supports connections from SQL Server Management Studio that use Active Directory Universal Authentication, which includes [Multi-Factor Authentication (MFA)](/azure/active-directory/authentication/multi-factor-authentication). MFA includes strong authentication with a range of easy verification options — phone call, text message, smart cards with pin, or mobile app notification. For more information, see [Universal Authentication with SQL Database and SQL Data Warehouse](../../azure-sql/mfa-authentication-ssms-overview.md).
5050

5151
To learn more about Azure AD authentication, see:
5252

articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,10 @@ Azure Active Directory benefits include:
5252
* Helps stop the proliferation of user identities across servers.
5353
* Allows password rotation in a single place
5454
* Manage database permissions using external (Azure AD) groups.
55-
* Eliminates storing passwords by enabling integrated Windows authentication and other forms of authentication supported by Azure Active Directory.
55+
* Eliminates storing passwords by enabling integrated Windows authentication and o ther forms of authentication supported by Azure Active Directory.
5656
* Uses contained database users to authenticate identities at the database level.
5757
* Supports token-based authentication for applications connecting to SQL pool.
58-
* Supports Multi-Factor authentication through Active Directory Universal Authentication for various tools including [SQL Server Management Studio](../../azure-sql/?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json) and [SQL Server Data Tools](/sql/ssdt/azure-active-directory?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest).
58+
* Supports Multi-Factor authentication through Active Directory Universal Authentication for various tools including [SQL Server Management Studio](../../azure-sql/mfa-authentication-ssms-overview.md?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json) and [SQL Server Data Tools](/sql/ssdt/azure-active-directory?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest).
5959

6060
> [!NOTE]
6161
> Azure Active Directory is still relatively new and has some limitations. To ensure that Azure Active Directory is a good fit for your environment, see [Azure AD features and limitations](../../azure-sql/database/aad-authentication-overview.md?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json#azure-ad-features-and-limitations), specifically the Additional considerations.

0 commit comments

Comments
 (0)