You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ssma/mysql/migrating-mysql-data-into-sql-server-azure-sql-db-mysqltosql.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,8 @@ After you have successfully synchronized the converted objects with [!INCLUDE[ss
22
22
> [!IMPORTANT]
23
23
> If the engine being used is Server Side Data Migration Engine, then, before migrating data, you must install the SSMA for MySQL Extension Pack and the MySQL providers on the computer that is running SSMA. The [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] Agent service must also be running. For more information about how to install the extension pack, see [Installing SSMA Components on SQL Server (MySQL to SQL)](./installing-ssma-components-on-sql-server-mysqltosql.md)
Before migrating data to [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] or SQL Azure, review the project migration options in the **Project Settings** dialog box.
27
29
@@ -110,7 +112,7 @@ When large data size needs to be migrated within a short duration, at scale offl
110
112
111
113
1. For large offline migration, click on Migrate data at scale.
112
114
113
-
1. Provide Azure active directory account for authentication. Once you entered the user name, click on connect.
115
+
1. Provide Microsoft Entra/Azure AD account for authentication. Once you entered the user name, click on connect.
114
116
115
117
1. Select the tenant and the subscription that already has the Azure SQL VM or Azure SQL database or managed instance configured and click next.
The v9.5 release of SSMA for MySQL contains the following changes:
@@ -125,7 +127,7 @@ The v8.16 release of SSMA for MySQL contains the following changes:
125
127
In addition to several accessibility improvements, the v8.15 release of SSMA for MySQL contains the following changes:
126
128
127
129
- Revamp assessment reports to work in modern browsers
128
-
- Use authority provided by the database for Azure AD authentication
130
+
- Use authority provided by the database for Microsoft Entra/Azure AD authentication
129
131
- Improve naming for statements loaded from files
130
132
131
133
## SSMA v8.14
@@ -149,7 +151,7 @@ The v8.12 release of SSMA for MySQL contains the following changes:
149
151
150
152
The v8.11 release of SSMA for MySQL contains the following changes:
151
153
152
-
- Use MSAL.NET library for interactive Azure Active Directory authentication
154
+
- Use MSAL.NET library for interactive Microsoft Entra/Azure AD authentication
153
155
154
156
## SSMA v8.10
155
157
@@ -191,7 +193,7 @@ To use this setting, in SSMA for MySQL, navigate to **Tools** > **Project Settin
191
193
192
194
## SSMA v8.5
193
195
194
-
The v8.5 release of SSMA for MySQL is enhanced with support for Azure Active Directory authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
196
+
The v8.5 release of SSMA for MySQL is enhanced with support for Microsoft Entra/Azure AD authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
195
197
196
198
> [!IMPORTANT]
197
199
> With SSMA v8.5, .NET 4.7.2 is an installation prerequisite. If you need to install this version, you can [download the runtime file](https://dotnet.microsoft.com/download/dotnet-framework/net472).
Copy file name to clipboardExpand all lines: docs/ssma/oracle/migrating-oracle-data-into-sql-server-oracletosql.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,8 @@ After you have successfully synchronized the converted objects with [!INCLUDE[ss
22
22
> [!IMPORTANT]
23
23
> If the engine being used is Server Side Data Migration Engine, then, before you can migrate data, you must install the SSMA for Oracle Extension Pack and the Oracle providers on the computer that is running SSMA. The SQL Server Agent service must also be running. For more information about how to install the extension pack, see [Installing Server Components (OracleToSQL)](./installing-ssma-components-on-sql-server-oracletosql.md)
Before migrating data to [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)], review the project migration options in the **Project Settings** dialog box.
27
29
@@ -103,7 +105,7 @@ When large data size needs to be migrated within a short duration, at scale offl
103
105
104
106
1. For large offline migration, click on Migrate data at scale.
105
107
106
-
1. Provide Azure active directory account for authentication. Once you entered the user name, click on connect.
108
+
1. Provide Microsoft Entra/Azure AD account for authentication. Once you entered the user name, click on connect.
107
109
108
110
1. Select the tenant and the subscription that already has the Azure SQL VM or Azure SQL database or managed instance configured and click next.
The v9.5 release of SSMA for Oracle contains the following changes:
@@ -140,7 +142,7 @@ In addition to several accessibility improvements, the v8.15 release of SSMA for
140
142
141
143
* Add setting to use full type specification for `%type` and `%rowtype` attributes
142
144
* Revamp assessment reports to work in modern browsers
143
-
* Use authority provided by the database for Azure AD authentication
145
+
* Use authority provided by the database for Microsoft Entra/Azure AD authentication
144
146
* Improve naming for statements loaded from files
145
147
146
148
## SSMA v8.14
@@ -177,7 +179,7 @@ The v8.11 release of SSMA for Oracle contains the following changes:
177
179
* Improved conversion of `COMMIT` statement
178
180
* Fix bug in `CONNECT BY LEVEL` clause conversion
179
181
* Updated parser error recovery logic to be less greedy
180
-
* Use MSAL.NET library for interactive Azure Active Directory authentication
182
+
* Use MSAL.NET library for interactive Microsoft Entra/Azure AD authentication
181
183
182
184
## SSMA v8.10
183
185
@@ -234,7 +236,7 @@ In addition, SSMA for Oracle now provides improved parsing of the `XMLTABLE` cla
234
236
235
237
## SSMA v8.5
236
238
237
-
The v8.5 release of SSMA for Oracle is enhanced with support for Azure Active Directory authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
239
+
The v8.5 release of SSMA for Oracle is enhanced with support for Microsoft Entra/Azure AD authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
238
240
239
241
In addition, SSMA for Oracle has been enhanced with support for:
The v9.5 release of SSMA for SAP ASE contains the following changes:
20
22
* Support for exclude schema in SSMA console mode
@@ -118,7 +120,7 @@ The v8.16 release of SSMA for SAP ASE contains the following changes:
118
120
In addition to several accessibility improvements, the v8.15 release of SSMA for SAP ASE contains the following changes:
119
121
120
122
* Revamp assessment reports to work in modern browsers
121
-
* Use authority provided by the database for Azure AD authentication
123
+
* Use authority provided by the database for Microsoft Entra/Azure AD authentication
122
124
* Improve naming for statements loaded from files
123
125
124
126
## SSMA v8.14
@@ -141,7 +143,7 @@ The v8.12 release of SSMA for SAP ASE contains minor performance improvements an
141
143
The v8.11 release of SSMA for SAP ASE contains the following changes:
142
144
143
145
* Fix conversion of temporary tables
144
-
* Use MSAL.NET library for interactive Azure Active Directory authentication
146
+
* Use MSAL.NET library for interactive Microsoft Entra/Azure AD authentication
145
147
146
148
## SSMA v8.10
147
149
@@ -182,7 +184,7 @@ To leverage this setting, in SSMA for SAP ASE, navigate to **Tools** > **Project
182
184
183
185
## SSMA v8.5
184
186
185
-
The v8.5 release of SSMA for SAP ASE is enhanced with support for Azure Active Directory authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
187
+
The v8.5 release of SSMA for SAP ASE is enhanced with support for Microsoft Entra/Azure AD authentication and basic support for JSON features in SQL Server, together with a targeted set of fixes designed to improve usability and performance.
186
188
187
189
In addition, SSMA for SAP ASE now allows you to hide system tables and views (exclude them from conversion).
Copy file name to clipboardExpand all lines: docs/ssms/f1-help/connect-to-server-login-page-database-engine.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ The current version of SQL Server Management Studio (SSMS) offers eight authenti
79
79
80
80
The user name to connect with. This setting is read-only when you select **Windows Authentication** or **Microsoft Entra Integrated** authentication. The setting is prefilled with the Windows user name you're currently logged in with.
81
81
82
-
If you're connecting with **Microsoft Entra Universal with MFA**, **Microsoft Entra Password**, **Microsoft Entra Service Principal**, or **Microsoft Entra Default**, enter the name of the Microsoft Entra identity you're connecting with.
82
+
If you connect with **Microsoft Entra Universal with MFA**, **Microsoft Entra Password**, **Microsoft Entra Service Principal**, or **Microsoft Entra Default**, enter the name of the Microsoft Entra identity you're connecting with.
The Output Window can be opened from the View menu. To access the settings, on the **Tools** menu, select **Options**, and expand the **Output Window** folder or use the key combination Ctrl+Alt+O.
28
30
29
31
There are multiple logging channels available to provide more information when using SQL Server Management Studio.
@@ -35,6 +37,6 @@ The following table gives an overview of the types of messages associated with e
35
37
|**Object Explorer**| This channel outputs the query text and elapsed times of SQL queries needed to expand nodes in Object Explorer. Each query logs a Begin Query and an End Query event. Each event has a timestamp and the URN associated with the entity being queried. The URN refers to the underlying SQL Management Object and consists of an XPath-style hierarchy. For example, the URN for a table named "Table1" in database "Db" on server "MyServer" would be "Server[@Name='MyServer']/Database[@Name='Db']/Table[/@Name='Table1']". Expanding one node in Object Explorer can require multiple such queries with different parameters. The End Query event contains the elapsed time of the query along with the T-SQL text. This query data is useful for server performance analysis in cases where Object Explorer seems unusually slow to expand a particular node. Note: only some nodes in Object Explorer provide this query detail when expanding. Enabled by default. |
36
38
|**Telemetry**| Telemetry is the stream of anonymous feature usage data collected by Microsoft. These events could be useful for your tracking of SSMS usage. It can help you identify what Object Explorer nodes you expand and what commands run during your SSMS session while the Output window is open. Enabled by default. |
37
39
|**SQL Client**| This channel displays information from the Microsoft.Data.SqlClient data provider. This option requires a restart of SSMS for output to appear. |
38
-
|**Microsoft Entra Interactive authentication**| For cases where Microsoft Entra authentication is used, this channel outputs information specific to the authentication process. |
39
-
|**Azure REST API**| This channel starts after authentication with Microsoft Entra credentials occurs. This channel outputs information specific to Azure REST API calls when Azure-connected features are used and more troubleshooting information is needed. |
40
+
|**Microsoft Entra interactive authentication**| For cases where Microsoft Entra authentication is used, this channel outputs information specific to the authentication process. |
41
+
|**Azure REST API**| This channel starts after authentication with Microsoft Entra credentials occurs. This channel outputs information specific to Azure REST API calls when Azure-connected features are used and more troubleshooting information is needed. |
40
42
|**Activity Monitor**| This channel starts when [Activity Monitor](../../relational-databases/performance-monitor/activity-monitor.md) opens for a server. This stream contains events showing part of the query text and timestamp of each query, error messages, and notifications of the monitor being paused due to connectivity problems. If Activity Monitor is idle or otherwise failing to update, check this output channel for more information. |
@@ -47,10 +49,10 @@ The article demonstrates the following steps:
47
49
|**Server name**| The fully qualified server name | Enter the name of your *Azure SQL Database* or *Azure SQL Managed Instance* name. |
48
50
|**Authentication**|||
49
51
|| Azure Active Directory <sup>1</sup> ||
50
-
|| - Universal with MFA | See [Using multi-factor Azure Active Directory authentication](/azure/azure-sql/database/authentication-mfa-ssms-overview). |
51
-
|| - Password<br />- Integrated<br />- Service Principal | See [Azure Active Directory service principal with Azure SQL](/azure/azure-sql/database/authentication-aad-service-principal). |
52
-
|| - Managed Identity | See [Managed identities in Azure AD for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity).<br />Connecting to a SQL instance with SSMS using a managed identity requires an Azure VM. See [Use a Windows VM system-assigned managed identity to access Azure SQL](/azure/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql)|
53
-
|| - Default | The default option can be used when connecting using any Azure AD authentication mode that's passwordless and noninteractive. |
52
+
|| - Universal with MFA | See [Using multi-factor Microsoft Entra authentication](/azure/azure-sql/database/authentication-mfa-ssms-overview). |
53
+
|| - Password<br />- Integrated<br />- Service Principal | See [Microsoft Entra service principal with Azure SQL](/azure/azure-sql/database/authentication-aad-service-principal). |
54
+
|| - Managed Identity | See [Managed identities in Microsoft Entra for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity).<br />Connecting to a SQL instance with SSMS using a managed identity requires an Azure VM. See [Use a Windows VM system-assigned managed identity to access Azure SQL](/azure/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql)|
55
+
|| - Default | The default option can be used when connecting using any Microsoft Entra authentication mode that's passwordless and noninteractive. |
54
56
|| SQL Server Authentication | Use **SQL Server Authentication** for Azure SQL to connect. |
55
57
|**Login**| Server account user ID | The user ID from the server account used to create the server. |
56
58
|**Password**| Server account password | The password from the server account used to create the server. |
Copy file name to clipboardExpand all lines: docs/ssms/quickstarts/ssms-connect-query-sql-server-azure-vm.md
+5-2
Original file line number
Diff line number
Diff line change
@@ -17,13 +17,16 @@ ms.custom: intro-quickstart
17
17
18
18
Get started using SQL Server Management Studio (SSMS) to connect to your SQL Server instance on an Azure Virtual Machine and run some Transact-SQL (T-SQL) commands.
|**Server type**| Database engine | For **Server type**, select **Database Engine** (usually the default option). |
70
-
|**Server name**| The fully qualified server name | For **Server name**, enter the name of your Azure SQL VM name. You can also use the Azure SQL VM IP address to connect. |
71
-
|**Authentication**| SQL Server Authentication | Use **SQL Server Authentication** for Azure SQL VM to connect. Also, if you have an Azure Active Directory environment setup, you can use any of the Azure Active Directory options. </br> </br> The **Windows Authentication** method isn't supported for Azure SQL VM. For more information, see [Azure SQL authentication](/azure/sql-database/sql-database-security-overview#access-management).|
73
+
|**Server name**| The fully qualified server name | For **Server name**, enter the name of your SQL Server VM name. You can also use the SQL Server VM IP address to connect. |
74
+
|**Authentication**| SQL Server Authentication | Use **SQL Server Authentication** for SQL Server VM to connect. Also, if you have a Microsoft Entra tenant setup, you can use any of the Azure Active Directory options. </br> </br> The **Windows Authentication** method isn't supported for SQL Server VM. For more information, see [Azure SQL authentication](/azure/sql-database/sql-database-security-overview#access-management).|
72
75
|**Login**| Server account user ID | The user ID from the server account used to create the server. A login is required when using **SQL Server Authentication**. |
73
76
|**Password**| Server account password | The password from the server account used to create the server. A password is required when using **SQL Server Authentication**. |
0 commit comments