Skip to content

Commit 72be940

Browse files
Merge pull request #34646 from Pietervanhove/LedgerManagedIdentity
Added Managed Identity for credential
2 parents a21e4a0 + 81285c0 commit 72be940

File tree

1 file changed

+12
-3
lines changed

1 file changed

+12
-3
lines changed

docs/relational-databases/security/ledger/ledger-digest-management.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides information on digest management for a ledger
44
author: VanMSFT
55
ms.author: vanto
66
ms.reviewer: mathoma
7-
ms.date: 02/07/2024
7+
ms.date: 07/09/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.custom: ignite-2023
@@ -60,7 +60,16 @@ In the following code snippet, replace `<your SAS key>` with the SAS key. The SA
6060
CREATE CREDENTIAL [https://ledgerstorage.blob.core.windows.net/sqldbledgerdigests]
6161
WITH IDENTITY='SHARED ACCESS SIGNATURE',
6262
SECRET = '<your SAS key>'
63-
```
63+
```
64+
65+
> [!NOTE]
66+
> Starting with SQL Server 2022 Cumulative Update 17 (CU17) and continuing in SQL Server 2025, you can use [managed identities with SQL Server credentials](../../../t-sql/statements/create-credential-transact-sql.md#g-create-and-use-a-managed-identity-credential-to-access-azure-blob-storage). Managed identities provide an identity for applications to use when connecting to resources that support Microsoft Entra authentication.
67+
>
68+
> This feature is supported only in:
69+
> - SQL Server on Azure Virtual Machines
70+
> - Azure Arc-enabled SQL Server 2025
71+
>
72+
> Managed identities aren't supported for SQL Server on-premises deployments.
6473
6574
#### Azure Confidential Ledger Permission
6675

@@ -104,7 +113,7 @@ Generating database digests requires the `GENERATE LEDGER DIGEST` permission. Fo
104113
Restoring the database back to an earlier point in time, also known as [Point in Time Restore](/azure/azure-sql/database/recovery-using-backups#point-in-time-restore), is an operation frequently used when a mistake occurs and users need to quickly revert the state of the database back to an earlier point in time. When uploading the generated digests to Azure Storage or Azure Confidential Ledger, the *create time* of the database is captured that these digests map to. Every time the database is restored, it's tagged with a new *create time* and this technique allows us to store the digests across different "incarnations" of the database. For SQL Server, the *create time* is the current UTC time when the digest upload is enabled for the first time. Ledger preserves the information regarding when a restore operation occurred, allowing the verification process to use all the relevant digests across the various incarnations of the database. Additionally, users can inspect all digests for different create times to identify when the database was restored and how far back it was restored to. Since this data is written in immutable storage, this information is protected as well.
105114

106115
> [!NOTE]
107-
> If you perform a native restore of a database backup in Azure SQL Managed Instance, you need to change the digest path manually using the Azure Portal, PowerShell or the Azure CLI.
116+
> If you perform a native restore of a database backup in Azure SQL Managed Instance, you need to change the digest path manually using the Azure portal, PowerShell, or the Azure CLI.
108117
109118
### Active geo-replication and Always On availability groups
110119

0 commit comments

Comments
 (0)