You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Azure SQL Managed Instance](sql-managed-instance-paas-overview.md) is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine compatibility with the benefits of a fully managed and evergreen platform as a service. Kerberos authentication for Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) enables Windows Authentication access to Azure SQL Managed Instance. Windows Authentication for managed instances empowers customers to move existing services to the cloud while maintaining a seamless user experience and provides the basis for infrastructure modernization.
18
19
@@ -24,7 +25,7 @@ As customers modernize their infrastructure, application, and data tiers, they a
However, some legacy apps can't change their authentication to Microsoft Entra ID: legacy application code may longer be available, there may be a dependency on legacy drivers, clients may not be able to be changed, and so on. Windows Authentication for Microsoft Entra principals removes this migration blocker and provides support for a broader range of customer applications.
28
+
However, some legacy apps can't change their authentication to Microsoft Entra ID: legacy application code might no longer be available, there could be a dependency on legacy drivers, clients might not be able to be changed, and so on. Windows Authentication for Microsoft Entra principals removes this migration blocker and provides support for a broader range of customer applications.
28
29
29
30
Windows Authentication for Microsoft Entra principals on managed instances is available for devices or virtual machines (VMs) joined to Active Directory, Microsoft Entra ID, or hybrid Microsoft Entra ID - a hybrid Microsoft Entra user identity exists both in Microsoft Entra ID and Active Directory and can access a managed instance in Azure using Microsoft Entra Kerberos.
30
31
@@ -38,7 +39,6 @@ By enabling Windows Authentication for Microsoft Entra principals, customers can
38
39
39
40
Windows Authentication for Microsoft Entra principals also enables the following patterns on managed instances. These patterns are frequently used in traditional on-premises SQL Servers:
40
41
41
-
42
42
-**"Double hop" authentication**: Web applications use IIS identity impersonation to run queries against an instance in the security context of the end user.
43
43
-**Traces using extended events and SQL Server Profiler** can be launched using Windows authentication, providing ease of use for database administrators and developers accustomed to this workflow. Learn how to [run a trace against Azure SQL Managed Instance using Windows Authentication for Microsoft Entra principals](winauth-azuread-run-trace-managed-instance.md).
44
44
@@ -48,9 +48,7 @@ Enabling Windows Authentication for Microsoft Entra principals on Azure SQL Mana
48
48
49
49
For example, a customer can enable a mobile analyst, using proven tools that rely on Windows Authentication, to authenticate to a managed instance using biometric credentials. This can be accomplished even if the mobile analyst works from a laptop that is joined to Microsoft Entra ID.
50
50
51
-
## Next steps
52
-
53
-
Learn more about implementing Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance:
51
+
## Related content
54
52
55
53
-[How Windows Authentication for Azure SQL Managed Instance is implemented with Microsoft Entra ID and Kerberos](winauth-implementation-aad-kerberos.md)
56
54
-[How to set up Windows Authentication for Azure SQL Managed Instance using Microsoft Entra ID and Kerberos](winauth-azuread-setup.md)
Copy file name to clipboardExpand all lines: docs/reporting-services/install-windows/e-mail-settings-reporting-services-native-mode-configuration-manager.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,9 @@ helpviewer_keywords:
17
17
---
18
18
# Email settings in Reporting Services native mode (Report Server Configuration Manager)
19
19
20
+
> [!IMPORTANT]
21
+
> Exchange Online [announced](https://techcommunity.microsoft.com/blog/exchange/exchange-online-to-retire-basic-auth-for-client-submission-smtp-auth/4114750) the retirement of Basic Auth with Client Submission (SMTP AUTH) scheduled for September 2025. The Exchange Online team recommends three alternatives for customers who must continue to use Basic auth with Client Submission (SMTP AUTH): [High Volume Emails for Microsoft 365](/Exchange/mail-flow-best-practices/high-volume-mails-m365), [Azure Communication Services Email](/azure/communication-services/concepts/email/email-smtp-overview), or [Anonymous relay on Exchange servers](/exchange/mail-flow/connectors/allow-anonymous-relay). Customers currently using Exchange Online Basic Auth with Client Submission (SMTP AUTH) for email distribution through SSRS or PBIRS are advised to start switching to one of these alternatives based on their specific requirements.
22
+
20
23
You can distribute reports through email by using the SQL Server Reporting Services (SSRS) email delivery extension. Depending on the email subscription configuration, distribution might include a notification, link, attachment, or embedded report. The email delivery extension works with your existing mail server technology that uses a Simple Mail Transfer Protocol (SMTP) server or forwarder. The report server connects to an SMTP server through Collaboration Data Objects (CDO) libraries (`cdosys.dll`) provided by the operating system.
21
24
22
25
The report server email delivery extension isn't configured by default. You use the Report Server Configuration Manager to minimally configure the extension. To set advanced properties, edit the `RSReportServer.config` file. If you can't configure the report server to use this extension, you can deliver reports to a shared folder instead. For more information, see [File share delivery in Reporting Services](../../reporting-services/subscriptions/file-share-delivery-in-reporting-services.md).
@@ -42,7 +45,7 @@ Before you can use Report Server email delivery, you must set configuration valu
42
45
> [!NOTE]
43
46
> Report server email settings are based on CDO. For more information about specific settings, see the CDO production documentation.
44
47
45
-
## <aname="rsconfigman"></a>Configure report server email by using the Report Server Configuration Manager
48
+
## <aname="rsconfigman"></a>Configure report server email by using the Report Server Configuration Manager
46
49
47
50
1. Start the Report Server Configuration Manager and connect to the report server instance.
[!INCLUDE [SQL Server Azure SQL Database Azure SQL Managed Instance](../../includes/applies-to-version/sql-asdb-asdbmi.md)]
31
+
[!INCLUDE [SQL Server Azure SQL Database Azure SQL Managed Instance](../../includes/applies-to-version/sql-asdb-asdbmi-fabricdw.md)]
32
32
33
33
Imports a data file into a database table or view in a user-specified format in [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)].
34
34
@@ -91,9 +91,6 @@ The `BULK INSERT` statement has different arguments and options in different pla
91
91
| Unsupported options |`*` wildcards in path |`*` wildcards in path |`DATA_SOURCE`, `FORMATFILE_DATA_SOURCE`, `ERRORFILE`, `ERRORFILE_DATA_SOURCE`|
92
92
| Enabled options but without effect |||`KEEPIDENTITY`, `FIRE_TRIGGERS`, `CHECK_CONSTRAINTS`, `TABLOCK`, `ORDER`, `ROWS_PER_BATCH`, `KILOBYTES_PER_BATCH`, and `BATCHSIZE` are not applicable. They will not throw a syntax error, but they will not have any effect |
93
93
94
-
> [!NOTE]
95
-
> The BULK INSERT statement is in [preview in Fabric Data Warehouse](https://blog.fabric.microsoft.com/blog/bulk-insert-statement-in-fabric-datawarehouse).
96
-
97
94
#### *database_name*
98
95
99
96
The database name in which the specified table or view resides. If not specified, *database_name* is the current database.
@@ -135,9 +132,12 @@ Fabric Warehouse supports `*` wildcards that can match any character in the URI,
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
140
+
141
141
#### BATCHSIZE = *batch_size*
142
142
143
143
Specifies the number of rows in a batch. Each batch is copied to the server as one transaction. If this fails, [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] commits or rolls back the transaction for every batch. By default, all data in the specified data file is one batch. For information about performance considerations, see [Performance considerations](#performance-considerations) later in this article.
@@ -159,6 +159,15 @@ A situation in which you might want constraints disabled (the default behavior)
159
159
160
160
Specifies the code page of the data in the data file. CODEPAGE is relevant only if the data contains **char**, **varchar**, or **text** columns with character values greater than **127** or less than **32**. For an example, see [Specify a code page](#d-specify-a-code-page).
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
170
+
162
171
CODEPAGE isn't a supported option on Linux for [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)]. For [!INCLUDE[sssql19-md](../../includes/sssql19-md.md)], only the **'RAW'** option is allowed for CODEPAGE.
163
172
164
173
You should specify a collation name for each column in a [format file](../../relational-databases/import-export/use-a-format-file-to-bulk-import-data-sql-server.md).
@@ -174,6 +183,15 @@ You should specify a collation name for each column in a [format file](../../rel
174
183
175
184
Specifies that BULK INSERT performs the import operation using the specified data-file type value.
|**char** (default)|Character format.<br /><br />For more information, see [Use Character Format to Import or Export Data (SQL Server)](../../relational-databases/import-export/use-character-format-to-import-or-export-data-sql-server.md).|
@@ -187,13 +205,16 @@ Specifies that BULK INSERT performs the import operation using the specified dat
187
205
188
206
Specifies a named external data source pointing to the Azure Blob Storage location of the file that will be imported. The external data source must be created using the `TYPE = BLOB_STORAGE` option added in [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)]. For more information, see [CREATE EXTERNAL DATA SOURCE](../../t-sql/statements/create-external-data-source-transact-sql.md). For an example, see [Import data from a file in Azure Blob Storage](#f-import-data-from-a-file-in-azure-blob-storage).
189
207
208
+
> [!NOTE]
209
+
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
210
+
190
211
```sql
191
212
CREATE EXTERNAL DATA SOURCE pandemicdatalake
192
-
WITH (LOCATION='https://pandemicdatalake.blob.core.windows.net/public/',TYPE=BLOB_STORAGE)
213
+
WITH (LOCATION='https://<data-lake>.blob.core.windows.net/public/',TYPE=BLOB_STORAGE)
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
246
+
217
247
The FIRSTROW attribute isn't intended to skip column headers. Skipping headers isn't supported by the BULK INSERT statement. If you choose to skip rows, the [!INCLUDE[ssDEnoversion](../../includes/ssdenoversion-md.md)] looks only at the field terminators, and doesn't validate the data in the fields of skipped rows.
218
248
219
249
#### FIRE_TRIGGERS
@@ -305,6 +335,15 @@ Beginning with [!INCLUDE [sssql17-md](../../includes/sssql17-md.md)], and in Azu
305
335
306
336
Specifies the field terminator to be used for **char** and **widechar** data files. The default field terminator is `\t` (tab character). For more information, see [Specify Field and Row Terminators (SQL Server)](../../relational-databases/import-export/specify-field-and-row-terminators-sql-server.md).
> Replace `<data-lake>.blob.core.windows.net` with an appropriate URL.
346
+
308
347
#### ROWTERMINATOR = '*row_terminator*'
309
348
310
349
Specifies the row terminator to be used for **char** and **widechar** data files. The default row terminator is `\r\n` (newline character). For more information, see [Specify Field and Row Terminators (SQL Server)](../../relational-databases/import-export/specify-field-and-row-terminators-sql-server.md).
0 commit comments