Skip to content

Commit 43b37d7

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/sql-docs-pr (branch live)
2 parents c076f69 + 5bb8487 commit 43b37d7

File tree

6 files changed

+113
-59
lines changed

6 files changed

+113
-59
lines changed

azure-sql/managed-instance/winauth-azuread-overview.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
2-
title: What is Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance?
2+
title: What Is Windows Authentication for Microsoft Entra Principals on Azure SQL Managed Instance?
33
titleSuffix: Azure SQL Managed Instance
44
description: Learn about Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance.
55
author: sravanisaluru
66
ms.author: srsaluru
7-
ms.reviewer: mathoma, bonova, urmilano, wiassaf
8-
ms.date: 09/27/2023
7+
ms.reviewer: mathoma, bonova, urmilano, wiassaf, randolphwest
8+
ms.date: 04/17/2025
99
ms.service: azure-sql-managed-instance
1010
ms.subservice: deployment-configuration
1111
ms.topic: overview
1212
---
1313

14-
# What is Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance?
15-
[!INCLUDE[appliesto-sqlmi](../includes/appliesto-sqlmi.md)]
14+
# What is Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance?
15+
16+
[!INCLUDE [appliesto-sqlmi](../includes/appliesto-sqlmi.md)]
1617

1718
[Azure SQL Managed Instance](sql-managed-instance-paas-overview.md) is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine compatibility with the benefits of a fully managed and evergreen platform as a service. Kerberos authentication for Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) enables Windows Authentication access to Azure SQL Managed Instance. Windows Authentication for managed instances empowers customers to move existing services to the cloud while maintaining a seamless user experience and provides the basis for infrastructure modernization.
1819

@@ -24,7 +25,7 @@ As customers modernize their infrastructure, application, and data tiers, they a
2425

2526
[!INCLUDE [entra-authentication-options](../includes/entra-authentication-options.md)]
2627

27-
However, some legacy apps can't change their authentication to Microsoft Entra ID: legacy application code may longer be available, there may be a dependency on legacy drivers, clients may not be able to be changed, and so on. Windows Authentication for Microsoft Entra principals removes this migration blocker and provides support for a broader range of customer applications.
28+
However, some legacy apps can't change their authentication to Microsoft Entra ID: legacy application code might no longer be available, there could be a dependency on legacy drivers, clients might not be able to be changed, and so on. Windows Authentication for Microsoft Entra principals removes this migration blocker and provides support for a broader range of customer applications.
2829

2930
Windows Authentication for Microsoft Entra principals on managed instances is available for devices or virtual machines (VMs) joined to Active Directory, Microsoft Entra ID, or hybrid Microsoft Entra ID - a hybrid Microsoft Entra user identity exists both in Microsoft Entra ID and Active Directory and can access a managed instance in Azure using Microsoft Entra Kerberos.
3031

@@ -38,7 +39,6 @@ By enabling Windows Authentication for Microsoft Entra principals, customers can
3839

3940
Windows Authentication for Microsoft Entra principals also enables the following patterns on managed instances. These patterns are frequently used in traditional on-premises SQL Servers:
4041

41-
4242
- **"Double hop" authentication**: Web applications use IIS identity impersonation to run queries against an instance in the security context of the end user.
4343
- **Traces using extended events and SQL Server Profiler** can be launched using Windows authentication, providing ease of use for database administrators and developers accustomed to this workflow. Learn how to [run a trace against Azure SQL Managed Instance using Windows Authentication for Microsoft Entra principals](winauth-azuread-run-trace-managed-instance.md).
4444

@@ -48,9 +48,7 @@ Enabling Windows Authentication for Microsoft Entra principals on Azure SQL Mana
4848

4949
For example, a customer can enable a mobile analyst, using proven tools that rely on Windows Authentication, to authenticate to a managed instance using biometric credentials. This can be accomplished even if the mobile analyst works from a laptop that is joined to Microsoft Entra ID.
5050

51-
## Next steps
52-
53-
Learn more about implementing Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance:
51+
## Related content
5452

5553
- [How Windows Authentication for Azure SQL Managed Instance is implemented with Microsoft Entra ID and Kerberos](winauth-implementation-aad-kerberos.md)
5654
- [How to set up Windows Authentication for Azure SQL Managed Instance using Microsoft Entra ID and Kerberos](winauth-azuread-setup.md)

docs/database-engine/configure-windows/enable-or-disable-a-server-network-protocol.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ All network protocols are installed during installation, by [!INCLUDE[ssNoVersio
6262
You can run this script from any machine, with or without SQL Server installed. Make sure you have the **SqlServer** module installed.
6363

6464
```powershell
65-
#requires the SqlServer module
65+
# This script requires the SqlServer module
6666
Import-Module SQLServer
6767
6868
$wmi = New-Object Microsoft.SqlServer.Management.Smo.Wmi.ManagedComputer <#computer_name#>
@@ -76,7 +76,7 @@ All network protocols are installed during installation, by [!INCLUDE[ssNoVersio
7676
$Tcp.IsEnabled = $true
7777
$Tcp.Alter()
7878
$Tcp
79-
79+
8080
# Enable the named pipes protocol for the default instance.
8181
$uri = "ManagedComputer[@Name='<#computer_name#>']/ServerInstance[@Name='MSSQLSERVER']/ServerProtocol[@Name='Np']"
8282
$Np = $wmi.GetSmoObject($uri)
@@ -99,22 +99,31 @@ After you enable or disable protocols, you must stop and restart the [!INCLUDE[s
9999

100100
```powershell
101101
# Get a reference to the ManagedComputer class.
102-
CD SQLSERVER:\SQL\<computer_name>
102+
Set-Location SQLSERVER:\SQL\<computer_name>
103103
$Wmi = (get-item .).ManagedComputer
104+
104105
# Get a reference to the default instance of the Database Engine.
105106
$DfltInstance = $Wmi.Services['MSSQLSERVER']
107+
106108
# Display the state of the service.
107109
$DfltInstance
110+
108111
# Stop the service.
109112
$DfltInstance.Stop();
113+
110114
# Wait until the service has time to stop.
115+
111116
# Refresh the cache.
112117
$DfltInstance.Refresh();
118+
113119
# Display the state of the service.
114120
$DfltInstance
121+
115122
# Start the service again.
116123
$DfltInstance.Start();
124+
117125
# Wait until the service has time to start.
126+
118127
# Refresh the cache and display the state of the service.
119128
$DfltInstance.Refresh();
120129
$DfltInstance

docs/reporting-services/install-windows/e-mail-settings-reporting-services-native-mode-configuration-manager.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ helpviewer_keywords:
1717
---
1818
# Email settings in Reporting Services native mode (Report Server Configuration Manager)
1919

20+
> [!IMPORTANT]
21+
> Exchange Online [announced](https://techcommunity.microsoft.com/blog/exchange/exchange-online-to-retire-basic-auth-for-client-submission-smtp-auth/4114750) the retirement of Basic Auth with Client Submission (SMTP AUTH) scheduled for September 2025. The Exchange Online team recommends three alternatives for customers who must continue to use Basic auth with Client Submission (SMTP AUTH): [High Volume Emails for Microsoft 365](/Exchange/mail-flow-best-practices/high-volume-mails-m365), [Azure Communication Services Email](/azure/communication-services/concepts/email/email-smtp-overview), or [Anonymous relay on Exchange servers](/exchange/mail-flow/connectors/allow-anonymous-relay). Customers currently using Exchange Online Basic Auth with Client Submission (SMTP AUTH) for email distribution through SSRS or PBIRS are advised to start switching to one of these alternatives based on their specific requirements.
22+
2023
You can distribute reports through email by using the SQL Server Reporting Services (SSRS) email delivery extension. Depending on the email subscription configuration, distribution might include a notification, link, attachment, or embedded report. The email delivery extension works with your existing mail server technology that uses a Simple Mail Transfer Protocol (SMTP) server or forwarder. The report server connects to an SMTP server through Collaboration Data Objects (CDO) libraries (`cdosys.dll`) provided by the operating system.
2124

2225
The report server email delivery extension isn't configured by default. You use the Report Server Configuration Manager to minimally configure the extension. To set advanced properties, edit the `RSReportServer.config` file. If you can't configure the report server to use this extension, you can deliver reports to a shared folder instead. For more information, see [File share delivery in Reporting Services](../../reporting-services/subscriptions/file-share-delivery-in-reporting-services.md).
@@ -42,7 +45,7 @@ Before you can use Report Server email delivery, you must set configuration valu
4245
> [!NOTE]
4346
> Report server email settings are based on CDO. For more information about specific settings, see the CDO production documentation.
4447
45-
## <a name="rsconfigman"></a> Configure report server email by using the Report Server Configuration Manager
48+
## <a name="rsconfigman"></a>Configure report server email by using the Report Server Configuration Manager
4649

4750
1. Start the Report Server Configuration Manager and connect to the report server instance.
4851
1. Go to **E-mail Settings**.

docs/t-sql/statements/bulk-insert-transact-sql.md

Lines changed: 47 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Transact-SQL reference for the BULK INSERT statement.
44
author: markingmyname
55
ms.author: maghan
66
ms.reviewer: randolphwest, wiassaf
7-
ms.date: 02/12/2025
7+
ms.date: 04/17/2025
88
ms.service: sql
99
ms.subservice: t-sql
1010
ms.topic: reference
@@ -28,7 +28,7 @@ monikerRange: "=azuresqldb-current || =azure-sqldw-latest || >=sql-server-2016 |
2828
---
2929
# BULK INSERT (Transact-SQL)
3030

31-
[!INCLUDE [SQL Server Azure SQL Database Azure SQL Managed Instance](../../includes/applies-to-version/sql-asdb-asdbmi.md)]
31+
[!INCLUDE [SQL Server Azure SQL Database Azure SQL Managed Instance](../../includes/applies-to-version/sql-asdb-asdbmi-fabricdw.md)]
3232

3333
Imports a data file into a database table or view in a user-specified format in [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)].
3434

@@ -91,9 +91,6 @@ The `BULK INSERT` statement has different arguments and options in different pla
9191
| Unsupported options | `*` wildcards in path | `*` wildcards in path | `DATA_SOURCE`, `FORMATFILE_DATA_SOURCE`, `ERRORFILE`, `ERRORFILE_DATA_SOURCE` |
9292
| Enabled options but without effect | | | `KEEPIDENTITY`, `FIRE_TRIGGERS`, `CHECK_CONSTRAINTS`, `TABLOCK`, `ORDER`, `ROWS_PER_BATCH`, `KILOBYTES_PER_BATCH`, and `BATCHSIZE` are not applicable. They will not throw a syntax error, but they will not have any effect |
9393

94-
> [!NOTE]
95-
> The BULK INSERT statement is in [preview in Fabric Data Warehouse](https://blog.fabric.microsoft.com/blog/bulk-insert-statement-in-fabric-datawarehouse).
96-
9794
#### *database_name*
9895

9996
The database name in which the specified table or view resides. If not specified, *database_name* is the current database.
@@ -135,9 +132,12 @@ Fabric Warehouse supports `*` wildcards that can match any character in the URI,
135132

136133
```sql
137134
BULK INSERT bing_covid_19_data
138-
FROM 'https://pandemicdatalake.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/*.csv';
135+
FROM 'https://<data-lake>.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/*.csv';
139136
```
140137

138+
> [!NOTE]
139+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
140+
141141
#### BATCHSIZE = *batch_size*
142142

143143
Specifies the number of rows in a batch. Each batch is copied to the server as one transaction. If this fails, [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] commits or rolls back the transaction for every batch. By default, all data in the specified data file is one batch. For information about performance considerations, see [Performance considerations](#performance-considerations) later in this article.
@@ -159,6 +159,15 @@ A situation in which you might want constraints disabled (the default behavior)
159159

160160
Specifies the code page of the data in the data file. CODEPAGE is relevant only if the data contains **char**, **varchar**, or **text** columns with character values greater than **127** or less than **32**. For an example, see [Specify a code page](#d-specify-a-code-page).
161161

162+
```sql
163+
BULK INSERT bing_covid_19_data
164+
FROM 'https://<data-lake>.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/bing_covid-19_data.csv'
165+
WITH (CODEPAGE = '65001', FIRSTROW=2);
166+
```
167+
168+
> [!NOTE]
169+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
170+
162171
CODEPAGE isn't a supported option on Linux for [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)]. For [!INCLUDE[sssql19-md](../../includes/sssql19-md.md)], only the **'RAW'** option is allowed for CODEPAGE.
163172

164173
You should specify a collation name for each column in a [format file](../../relational-databases/import-export/use-a-format-file-to-bulk-import-data-sql-server.md).
@@ -174,6 +183,15 @@ You should specify a collation name for each column in a [format file](../../rel
174183

175184
Specifies that BULK INSERT performs the import operation using the specified data-file type value.
176185

186+
```sql
187+
BULK INSERT bing_covid_19_data
188+
FROM 'https://<data-lake>.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/bing_covid-19_data.csv'
189+
WITH (DATAFILETYPE = 'char', FIRSTROW=2);
190+
```
191+
192+
> [!NOTE]
193+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
194+
177195
|DATAFILETYPE value|All data represented in:|
178196
|------------------------|------------------------------|
179197
|**char** (default)|Character format.<br /><br />For more information, see [Use Character Format to Import or Export Data &#40;SQL Server&#41;](../../relational-databases/import-export/use-character-format-to-import-or-export-data-sql-server.md).|
@@ -187,13 +205,16 @@ Specifies that BULK INSERT performs the import operation using the specified dat
187205

188206
Specifies a named external data source pointing to the Azure Blob Storage location of the file that will be imported. The external data source must be created using the `TYPE = BLOB_STORAGE` option added in [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)]. For more information, see [CREATE EXTERNAL DATA SOURCE](../../t-sql/statements/create-external-data-source-transact-sql.md). For an example, see [Import data from a file in Azure Blob Storage](#f-import-data-from-a-file-in-azure-blob-storage).
189207

208+
> [!NOTE]
209+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
210+
190211
```sql
191212
CREATE EXTERNAL DATA SOURCE pandemicdatalake
192-
WITH (LOCATION='https://pandemicdatalake.blob.core.windows.net/public/',TYPE=BLOB_STORAGE)
213+
WITH (LOCATION='https://<data-lake>.blob.core.windows.net/public/',TYPE=BLOB_STORAGE)
193214
GO
194215
BULK INSERT bing_covid_19_data
195216
FROM 'curated/covid-19/bing_covid-19_data/latest/bing_covid-19_data.csv'
196-
WITH (DATA_SOURCE='pandemicdatalake',FIRSTROW = 2,LASTROW = 100,FIELDTERMINATOR = ',');
217+
WITH (DATA_SOURCE='<data-lake>',FIRSTROW = 2,LASTROW = 100,FIELDTERMINATOR = ',');
197218
```
198219

199220
#### ERRORFILE = '*error_file_path*'
@@ -214,6 +235,15 @@ Specifies a named external data source pointing to the Azure Blob Storage locati
214235

215236
Specifies the number of the first row to load. The default is the first row in the specified data file. FIRSTROW is 1-based.
216237

238+
```sql
239+
BULK INSERT bing_covid_19_data
240+
FROM 'https://<data-lake>.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/bing_covid-19_data.csv'
241+
WITH (FIRSTROW=2);
242+
```
243+
244+
> [!NOTE]
245+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
246+
217247
The FIRSTROW attribute isn't intended to skip column headers. Skipping headers isn't supported by the BULK INSERT statement. If you choose to skip rows, the [!INCLUDE[ssDEnoversion](../../includes/ssdenoversion-md.md)] looks only at the field terminators, and doesn't validate the data in the fields of skipped rows.
218248

219249
#### FIRE_TRIGGERS
@@ -305,6 +335,15 @@ Beginning with [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)], and in Azu
305335

306336
Specifies the field terminator to be used for **char** and **widechar** data files. The default field terminator is `\t` (tab character). For more information, see [Specify Field and Row Terminators &#40;SQL Server&#41;](../../relational-databases/import-export/specify-field-and-row-terminators-sql-server.md).
307337

338+
```sql
339+
BULK INSERT bing_covid_19_data
340+
FROM 'https://<data-lake>.blob.core.windows.net/public/curated/covid-19/bing_covid-19_data/latest/bing_covid-19_data.csv'
341+
WITH (FIELDTERMINATOR = ',', FIRSTROW=2);
342+
```
343+
344+
> [!NOTE]
345+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
346+
308347
#### ROWTERMINATOR = '*row_terminator*'
309348

310349
Specifies the row terminator to be used for **char** and **widechar** data files. The default row terminator is `\r\n` (newline character). For more information, see [Specify Field and Row Terminators &#40;SQL Server&#41;](../../relational-databases/import-export/specify-field-and-row-terminators-sql-server.md).

0 commit comments

Comments
 (0)