Skip to content

Commit 9e55bcc

Browse files
authored
Refresh articles 2 (#34569)
1 parent d714a34 commit 9e55bcc

File tree

9 files changed

+121
-124
lines changed

9 files changed

+121
-124
lines changed

azure-sql/database/firewall-configure.md

Lines changed: 76 additions & 79 deletions
Large diffs are not rendered by default.

azure-sql/database/logins-create-manage.md

Lines changed: 23 additions & 23 deletions
Large diffs are not rendered by default.
-25.2 KB
Loading
-5.16 KB
Loading
-17.5 KB
Loading
-16.3 KB
Loading

docs/database-engine/configure-windows/certificate-requirements.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Certificate requirements for SQL Server
2+
title: Certificate Requirements for SQL Server
33
description: This article describes the requirements for SQL Server encryption and how to check if a certificate meets the requirements.
44
author: VanMSFT
55
ms.author: vanto
66
ms.reviewer: randolphwest
7-
ms.date: 04/18/2024
7+
ms.date: 06/30/2025
88
ms.service: sql
99
ms.subservice: configuration
1010
ms.topic: conceptual
@@ -16,7 +16,7 @@ This article describes certificate requirements for [!INCLUDE [ssnoversion-md](.
1616

1717
## Certificate requirements for SQL Server encryption
1818

19-
For using TLS for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] encryption, you need to provision a certificate (one of the three digital types) that meets the following conditions:
19+
For using Transport Layer Security (TLS) for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] encryption, you need to provision a certificate (one of the three digital types) that meets the following conditions:
2020

2121
- The certificate must be in either the local computer certificate store or the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] service account certificate store. We recommend local computer certificate store as it avoids reconfiguring certificates with [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] startup account changes.
2222

@@ -38,7 +38,7 @@ For using TLS for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)]
3838
The client must be able to verify the ownership of the certificate used by the server. If the client has the public key certificate of the certification authority that signed the server certificate, no further configuration is necessary. Microsoft Windows includes the public key certificates of many certification authorities. If the server certificate was signed by a public or private certification authority for which the client doesn't have the public key certificate, you must install the public key certificate of the certification authority that signed the server certificate on each client that is going to connect to [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)].
3939

4040
> [!IMPORTANT]
41-
> [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] will not start if a certificate exists in the computer store, but only meets some requirements in the above list and if it's manually configured for use by [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] Configuration Manager or through registry entries. Select another certificate that meets all the requirements or remove the certificate from being used by [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] until you can provision one that meets requirements or use a self-generated certificate as discussed in [SQL Server generated self-signed certificates](configure-sql-server-encryption.md#sql-server-generated-self-signed-certificates).
41+
> [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] won't start if a certificate exists in the computer store, but only meets some requirements in the above list and if it's manually configured for use by [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] Configuration Manager or through registry entries. Select another certificate that meets all the requirements or remove the certificate from being used by [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] until you can provision one that meets requirements or use a self-generated certificate as discussed in [SQL Server generated self-signed certificates](configure-sql-server-encryption.md#sql-server-generated-self-signed-certificates).
4242
4343
## Check if a certificate meets the requirements
4444

@@ -64,7 +64,7 @@ You can use one of the following methods to check the validity of the certificat
6464

6565
### Expired certificates
6666

67-
[!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] only checks the validity of the certificates at the time of configuration. For example, you can't use Configuration Manager on [!INCLUDE [sssql19-md](../../includes/sssql19-md.md)] and later versions, to provision an expired certificate. [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] continues to run without problems if the certificate expires after it is already provisioned. But, some client applications like Power BI check the validity of the certificate on each connection and raise an error if the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] instance is configured to use an expired certificate for encryption. We recommend that you don't use an expired certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] encryption.
67+
[!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] only checks the validity of the certificates at the time of configuration. For example, you can't use Configuration Manager on [!INCLUDE [sssql19-md](../../includes/sssql19-md.md)] and later versions, to provision an expired certificate. [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] continues to run without problems if the certificate expires after it's already provisioned. But, some client applications like Power BI check the validity of the certificate on each connection and raise an error if the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] instance is configured to use an expired certificate for encryption. We recommend that you don't use an expired certificate for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] encryption.
6868

6969
## Related content
7070

docs/relational-databases/security/choose-an-authentication-mode.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: "Choose an authentication mode"
2+
title: "Choose an Authentication Mode"
33
description: Choose between Windows Authentication mode and mixed mode authentication for the SQL Server Database Engine at setup time.
44
author: VanMSFT
55
ms.author: vanto
6-
ms.date: 09/12/2024
6+
ms.date: 06/30/2025
77
ms.service: sql
88
ms.subservice: security
99
ms.topic: how-to
@@ -33,7 +33,7 @@ During setup, you must select an authentication mode for the [!INCLUDE [ssDE](..
3333

3434
If you select Mixed Mode Authentication (SQL Server and Windows Authentication mode) during setup, you must provide and then confirm a strong password for the built-in [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] system administrator account named `sa`. The `sa` account connects by using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication.
3535

36-
If you select Windows Authentication during setup, the setup creates the `sa` account for [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] authentication but it's disabled. If you later change to Mixed Mode Authentication and you want to use the `sa` account, you must enable the account. Any Windows or [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] account can be configured as a system administrator. Because the `sa` account is well known and often targeted by malicious users, don't enable the `sa` account unless your application requires it. Never set a blank or weak password for the `sa` account. To change from Windows Authentication mode to Mixed Mode Authentication and use [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, see [Change Server Authentication Mode](../../database-engine/configure-windows/change-server-authentication-mode.md).
36+
If you select Windows Authentication during setup, the setup creates the `sa` account for [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] authentication but it's disabled. If you later change to Mixed Mode Authentication and you want to use the `sa` account, you must enable the account. Any Windows or [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] account can be configured as a system administrator. Because the `sa` account is well known and often targeted by malicious users, don't enable the `sa` account unless your application requires it. Never set a blank or weak password for the `sa` account. To change from Windows Authentication mode to Mixed Mode Authentication and use [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, see [Change server authentication mode](../../database-engine/configure-windows/change-server-authentication-mode.md).
3737

3838
## Connecting through Windows Authentication
3939

@@ -48,7 +48,7 @@ By using Windows Authentication, Windows groups can be created at the domain lev
4848
4949
## Connecting through SQL Server Authentication
5050

51-
When using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, logins are created in [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] that aren't based on Windows user accounts. Both the user name and the password are created by using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] and stored in [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)]. Users connecting using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication must provide their credentials (login and password) every time that they connect. When using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, you must set strong passwords for all [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] accounts. For strong password guidelines, see [Strong Passwords](../../relational-databases/security/strong-passwords.md).
51+
When using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, logins are created in [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] that aren't based on Windows user accounts. Both the user name and the password are created by using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] and stored in [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)]. Users connecting using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication must provide their credentials (login and password) every time that they connect. When using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication, you must set strong passwords for all [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] accounts. For strong password guidelines, see [Strong Passwords](strong-passwords.md).
5252

5353
Three optional password policies are available for [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] logins.
5454

@@ -97,8 +97,8 @@ Three optional password policies are available for [!INCLUDE [ssNoVersion](../..
9797
- Allows software developers to distribute their applications by using a complex permission hierarchy based on known, preset [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] logins.
9898

9999
> [!NOTE]
100-
> Using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication does not limit the permissions of local administrators on the computer where [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] is installed.
100+
> Using [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] Authentication doesn't limit the permissions of local administrators on the computer where [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] is installed.
101101
102102
## Related content
103103

104-
- [Security Considerations for a SQL Server Installation](../../sql-server/install/security-considerations-for-a-sql-server-installation.md)
104+
- [Security considerations for a SQL Server installation](../../sql-server/install/security-considerations-for-a-sql-server-installation.md)

docs/relational-databases/security/password-policy.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Password Policy"
33
description: This article goes over the Windows password policy mechanisms applying to a login that uses SQL Server authentication and to a contained database user with a password.
44
author: VanMSFT
55
ms.author: vanto
6-
ms.date: 05/24/2024
6+
ms.date: 06/30/2025
77
ms.service: sql
88
ms.subservice: security
99
ms.topic: conceptual
@@ -39,7 +39,7 @@ helpviewer_keywords:
3939
[!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)] can apply the same complexity and expiration policies used in Windows to passwords used inside [!INCLUDE [ssNoVersion](../../includes/ssnoversion-md.md)]. This functionality depends on the `NetValidatePasswordPolicy` API.
4040

4141
> [!NOTE]
42-
> Azure SQL Database enforces [password complexity](#password-complexity). The password expiration and policy enforcement sections do not apply to Azure SQL Database.
42+
> Azure SQL Database enforces [password complexity](#password-complexity). The password expiration and policy enforcement sections don't apply to Azure SQL Database.
4343
>
4444
> For information on password policy for Azure SQL Managed Instance, see our [SQL Managed Instance FAQ](/azure/azure-sql/managed-instance/frequently-asked-questions-faq#password-policy-).
4545
@@ -69,7 +69,7 @@ Password expiration policies are used to manage the lifespan of a password. When
6969

7070
## Policy Enforcement
7171

72-
The enforcement of password policy can be configured separately for each SQL Server login. Use [ALTER LOGIN (Transact-SQL)](../../t-sql/statements/alter-login-transact-sql.md) to configure the password policy options of a SQL Server login. The following rules apply to the configuration of password policy enforcement:
72+
The enforcement of password policy can be configured separately for each SQL Server login. Use [ALTER LOGIN](../../t-sql/statements/alter-login-transact-sql.md) to configure the password policy options of a SQL Server login. The following rules apply to the configuration of password policy enforcement:
7373

7474
- When CHECK_POLICY is changed to ON, the following behaviors occur:
7575

@@ -104,7 +104,7 @@ Some combinations of policy options aren't supported.
104104
The security policy might be set in Windows, or might be received from the domain. To view the password policy on the computer, use the Local Security Policy MMC snap-in (**secpol.msc**).
105105

106106
> [!NOTE]
107-
> For SQL Server logins that have CHECK_POLICY enabled, if you run [ALTER LOGIN](../../t-sql/statements/alter-login-transact-sql.md) and do not include OLD_PASSWORD in the command to change the password, then [Enforce Password History](/windows/security/threat-protection/security-policy-settings/enforce-password-history) is ignored. This is a by-design behavior to allow password resets, despite any previously used passwords. Other checks associated with CHECK_POLICY, including length and complexity are checked regardless of whether OLD_PASSWORD is used.
107+
> For SQL Server logins that have CHECK_POLICY enabled, if you run [ALTER LOGIN](../../t-sql/statements/alter-login-transact-sql.md) and don't include OLD_PASSWORD in the command to change the password, then [Enforce Password History](/windows/security/threat-protection/security-policy-settings/enforce-password-history) is ignored. This is a by-design behavior to allow password resets, despite any previously used passwords. Other checks associated with CHECK_POLICY, including length and complexity are checked regardless of whether OLD_PASSWORD is used.
108108
109109
## Checking SQL user password policy information
110110

@@ -128,18 +128,18 @@ FROM sys.sql_logins;
128128

129129
## Related tasks
130130

131-
[CREATE LOGIN (Transact-SQL)](../../t-sql/statements/create-login-transact-sql.md)
131+
[CREATE LOGIN](../../t-sql/statements/create-login-transact-sql.md)
132132

133-
[ALTER LOGIN (Transact-SQL)](../../t-sql/statements/alter-login-transact-sql.md)
133+
[ALTER LOGIN](../../t-sql/statements/alter-login-transact-sql.md)
134134

135-
[CREATE USER (Transact-SQL)](../../t-sql/statements/create-user-transact-sql.md)
135+
[CREATE USER](../../t-sql/statements/create-user-transact-sql.md)
136136

137-
[ALTER USER (Transact-SQL)](../../t-sql/statements/alter-user-transact-sql.md)
137+
[ALTER USER](../../t-sql/statements/alter-user-transact-sql.md)
138138

139-
[Create a Login](../../relational-databases/security/authentication-access/create-a-login.md)
139+
[Create a login](authentication-access/create-a-login.md)
140140

141-
[Create a Database User](../../relational-databases/security/authentication-access/create-a-database-user.md)
141+
[Create a database user](authentication-access/create-a-database-user.md)
142142

143143
## Related content
144144

145-
- [Strong Passwords](../../relational-databases/security/strong-passwords.md)
145+
- [Strong Passwords](strong-passwords.md)

0 commit comments

Comments
 (0)