Skip to content

Commit 570f231

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into 20250709-fabric-permissions
2 parents 2000dbe + 86d8e57 commit 570f231

File tree

205 files changed

+6710
-5242
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+6710
-5242
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -134,12 +134,6 @@
134134
"branch": "master",
135135
"branch_mapping": {}
136136
},
137-
{
138-
"path_to_root": "azure-docs-pr",
139-
"url": "https://github.com/MicrosoftDocs/azure-docs-pr",
140-
"branch": "main",
141-
"branch_mapping": {}
142-
},
143137
{
144138
"path_to_root": "azure-compute-docs-pr",
145139
"url": "https://github.com/MicrosoftDocs/azure-compute-docs-pr",
@@ -199,4 +193,4 @@
199193
".openpublishing.redirection.stretch-database.json",
200194
".openpublishing.redirection.visual-studio-code-extensions.json"
201195
]
202-
}
196+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47630,6 +47630,11 @@
4763047630
"redirect_url": "/previous-versions/sql/2014/tools/sqlagent90-application",
4763147631
"redirect_document_id": false
4763247632
},
47633+
{
47634+
"source_path": "docs/tools/sqlagent90-application.md",
47635+
"redirect_url": "/sql/tools/sqlagent-application",
47636+
"redirect_document_id": false
47637+
},
4763347638
{
4763447639
"source_path": "docs/2014/tools/sqlcmd-utility.md",
4763547640
"redirect_url": "/previous-versions/sql/2014/tools/sqlcmd-utility",

azure-sql/database/ai-artificial-intelligence-intelligent-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ End-to-end examples:
196196

197197
[Semantic Kernel is an open-source SDK](/semantic-kernel/overview/) that lets you easily build agents that can call your existing code. As a highly extensible SDK, you can use Semantic Kernel with models from OpenAI, Azure OpenAI, Hugging Face, and more. By combining your existing C#, Python, and Java code with these models, you can build agents that answer questions and automate processes.
198198

199-
- [Microsoft.SemanticKernel.Connectors.SqlServer](https://github.com/microsoft/semantic-kernel/tree/main/dotnet/src/Connectors/Connectors.Memory.SqlServer)
199+
- [Microsoft.SemanticKernel.Connectors.SqlServer](/dotnet/api/microsoft.semantickernel.connectors.sqlserver)
200200

201201
An example of how easily Semantic Kernel helps to build AI-enabled solution is here:
202202

azure-sql/database/auditing-analyze-audit-logs.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ titleSuffix: Azure SQL Database & Azure Synapse Analytics
44
description: Use Auditing to analyze logs in Log Analytics, Event Hubs, or through an Azure storage account.
55
author: sravanisaluru
66
ms.author: srsaluru
7-
ms.reviewer: mathoma
8-
ms.date: 06/10/2025
7+
ms.reviewer: mathoma, vanto
8+
ms.date: 07/09/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
1212
---
1313
# Use Auditing to analyze audit logs and reports
1414

15-
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
15+
[!INCLUDE [appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
1616

1717
This article provides an overview of analyzing audit logs using Auditing for [Azure SQL Database](sql-database-paas-overview.md) and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). You can use Auditing to analyze audit logs stored in:
1818

@@ -29,7 +29,6 @@ If you chose to write audit logs to Log Analytics:
2929
1. At the top of the database's **Auditing** page, select **View audit logs** to display a sample of audit logs with a limited set of fields that cover activity from up to 2 hours prior to the selected **End Time** (which defaults to 'now'):
3030

3131
:::image type="content" source="media/auditing-analyze-audit-logs/view-audit-logs.png" alt-text="Screenshot of the Auditing menu in the Azure portal where you can select the View audit logs option." lightbox="media/auditing-analyze-audit-logs/view-audit-logs.png":::
32-
3332

3433
You have two ways to view the logs:
3534

@@ -70,7 +69,7 @@ If you chose to write audit logs to an Azure storage account, there are several
7069

7170
1. The merged file opens in SSMS, where you can view and analyze it, as well as export it to an XEL or CSV file, or to a table.
7271

73-
- Use Power BI. You can view and analyze audit log data in Power BI. For more information and to access a downloadable template, see [Blog: Analyze audit log data in Power BI](https://techcommunity.microsoft.com/blog/azuredbsupport/sql-azure-blob-auditing-basic-power-bi-dashboard/368895).
72+
- Use Power BI. You can view and analyze audit log data in Power BI. For more information, see [Using Azure Log Analytics in Power BI](/power-bi/transform-model/log-analytics/desktop-log-analytics-overview).
7473
- Download log files from your Azure Storage blob container via the portal or by using a tool such as [Azure Storage Explorer](https://azure.microsoft.com/products/storage/storage-explorer).
7574
- After you have downloaded a log file locally, double-click the file to open, view, and analyze the logs in SSMS.
7675
- You can also download multiple files simultaneously in Azure Storage Explorer. To do so, right-click a specific subfolder and select **Save as** to save in a local folder.

azure-sql/database/authentication-aad-directory-readers-role.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about the directory reader's role in Microsoft Entra for Azur
55
author: VanMSFT
66
ms.author: vanto
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 06/10/2025
8+
ms.date: 07/17/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -41,17 +41,17 @@ The **Directory Readers** role can be used as the server or instance identity to
4141

4242
In order to assign the [**Directory Readers**](/azure/active-directory/roles/permissions-reference#directory-readers) role to an identity, a user with [Privileged Role Administrator](/azure/active-directory/roles/permissions-reference#privileged-role-administrator) or higher permissions are needed. Users who often manage or deploy SQL Database, SQL Managed Instance, or Azure Synapse might not have access to these highly privileged roles. This can often cause complications for users that create unplanned Azure SQL resources, or need help from highly privileged role members that are often inaccessible in large organizations.
4343

44-
For SQL Managed Instance, the **Directory Readers** role must be assigned to the managed instance identity before you can [set up a Microsoft Entra admin for the managed instance](authentication-aad-configure.md#provision-azure-ad-admin-sql-managed-instance).
44+
For SQL Managed Instance, the **Directory Readers** role or lower level permissions discussed in [Managed identities in Microsoft Entra for Azure SQL](authentication-azure-ad-user-assigned-managed-identity.md) must be assigned to the managed instance identity before you can [set up a Microsoft Entra admin for the managed instance](authentication-aad-configure.md#provision-azure-ad-admin-sql-managed-instance).
4545

46-
Assigning the **Directory Readers** role to the server identity isn't required for SQL Database or Azure Synapse when setting up a Microsoft Entra admin for the logical server. However, to enable Microsoft Entra object creation in SQL Database or Azure Synapse on behalf of a Microsoft Entra application, the **Directory Readers** role is required. If the role isn't assigned to the logical server identity, creating Microsoft Entra users in Azure SQL will fail. For more information, see [Microsoft Entra service principals with Azure SQL](authentication-aad-service-principal.md).
46+
Assigning the **Directory Readers** role to the server identity isn't required for SQL Database or Azure Synapse when setting up a Microsoft Entra admin for the logical server. However, to enable Microsoft Entra object creation in SQL Database or Azure Synapse on behalf of a Microsoft Entra application, the **Directory Readers** role or lower level permissions discussed in [Managed identities in Microsoft Entra for Azure SQL](authentication-azure-ad-user-assigned-managed-identity.md) is required. If the role or permissions aren't assigned to the logical server identity, creating Microsoft Entra users in Azure SQL will fail. For more information, see [Microsoft Entra service principals with Azure SQL](authentication-aad-service-principal.md).
4747

4848
<a id="granting-the-directory-readers-role-to-an-azure-ad-group"></a>
4949

5050
<a id="granting-the-directory-readers-role-to-a-microsoft-entra-group"></a>
5151

5252
## Grant the Directory Readers role to a Microsoft Entra group
5353

54-
You can now have a [Privileged Role Administrator](/azure/active-directory/roles/permissions-reference#privileged-role-administrator) create a Microsoft Entra group and assign the [**Directory Readers**](/azure/active-directory/roles/permissions-reference#directory-readers) permission to the group. This will allow access to the Microsoft Graph API for members of this group. In addition, Microsoft Entra users who are owners of this group are allowed to assign new members for this group, including identities of the logical servers.
54+
You can have a [Privileged Role Administrator](/azure/active-directory/roles/permissions-reference#privileged-role-administrator) create a Microsoft Entra group and assign the [**Directory Readers**](/azure/active-directory/roles/permissions-reference#directory-readers) permission to the group. This will allow access to the Microsoft Graph API for members of this group. In addition, Microsoft Entra users who are owners of this group are allowed to assign new members for this group, including identities of the logical servers.
5555

5656
This solution still requires a high privilege user (Privileged Role Administrator or higher permissions) to create a group and assign users as a one time activity, but the Microsoft Entra group owners will be able to assign additional members going forward. This eliminates the need to involve a high privilege user in the future to configure all SQL Databases, SQL Managed Instances, or Azure Synapse servers in their Microsoft Entra tenant.
5757

0 commit comments

Comments
 (0)