Skip to content

Commit bf18f30

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into sqlsvr-aad-p5
2 parents 54c4458 + f3ad5d2 commit bf18f30

File tree

1,097 files changed

+14397
-12975
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,097 files changed

+14397
-12975
lines changed

azure-sql/database/active-directory-interactive-connect-azure-sql-db.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
# Connect to Azure SQL Database with Microsoft Entra multifactor authentication
1717
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1818

19-
This article provides a C# program that connects to Azure SQL Database. The program uses interactive mode authentication, which supports [multifactor authentication](/azure/active-directory/authentication/concept-mfa-howitworks) using Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)).
19+
This article provides a C# program that connects to Azure SQL Database. The program uses interactive mode authentication, which supports [multifactor authentication](/azure/active-directory/authentication/concept-mfa-howitworks) using Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)).
2020

2121
For more information about multifactor authentication support for SQL tools, see [Using Microsoft Entra multifactor authentication](./authentication-mfa-ssms-overview.md).
2222

azure-sql/database/active-geo-replication-configure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ Remove-AzSqlDatabaseSecondary @parameters
225225

226226
## Cross-subscription geo-replication
227227

228-
Use Transact-SQL (T-SQL) create a geo-secondary in a subscription different from the subscription of the primary (whether under the same tenant of Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)) or not), follow the steps in this section.
228+
Use Transact-SQL (T-SQL) create a geo-secondary in a subscription different from the subscription of the primary (whether under the same tenant of Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) or not), follow the steps in this section.
229229

230230
1. Add the IP address of the client machine executing the T-SQL commands in this example, to the server firewalls of **both** the primary and secondary servers. You can confirm that IP address by executing the following query while connected to the primary server from the same client machine.
231231

azure-sql/database/active-geo-replication-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ Review [license-free standby replica](standby-replica-how-to-configure.md) to le
134134

135135
## Cross-subscription geo-replication
136136

137-
Use Transact-SQL (T-SQL) create a geo-secondary in a subscription different from the subscription of the primary (whether under the same tenant of Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)) or not). Review [Configure active geo-replication](active-geo-replication-configure-portal.md) to learn more.
137+
Use Transact-SQL (T-SQL) create a geo-secondary in a subscription different from the subscription of the primary (whether under the same tenant of Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) or not). Review [Configure active geo-replication](active-geo-replication-configure-portal.md) to learn more.
138138

139139
## <a name="keeping-credentials-and-firewall-rules-in-sync"></a> Keep credentials and firewall rules in sync
140140

azure-sql/database/active-geo-replication-security-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The main trade-off is that managing the disaster recovery process at scale is mo
2626
If you are using logins and users (rather than contained users), you must take extra steps to ensure that the same logins exist in the `master` database. The following sections outline the steps involved and additional considerations.
2727

2828
>[!NOTE]
29-
> It's also possible to use logins created from Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)) to manage your databases. For more information, see [Azure SQL logins and users](./logins-create-manage.md).
29+
> It's also possible to use logins created from Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) to manage your databases. For more information, see [Azure SQL logins and users](./logins-create-manage.md).
3030
3131
### Set up user access to a secondary or recovered database
3232

azure-sql/database/alerts-insights-configure-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Setup alerts and notifications in the Azure portal
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: Use the Azure portal to create alerts, which can trigger notifications or automation when the conditions you specify are met.
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/always-encrypted-enclaves-getting-started.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.custom:
1111
ms.topic: conceptual
1212
---
1313
# Getting started using Always Encrypted with secure enclaves
14+
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1415

1516
These tutorials teach you how to get started with [Always Encrypted with secure enclaves](/sql/relational-databases/security/encryption/always-encrypted-enclaves). They'll show you:
1617

azure-sql/database/always-encrypted-with-secure-enclaves-landing.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
ms.author: vanto
1616
ms.reviewer: mathoma
1717
ms.date: 04/05/2023
18-
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"
18+
monikerRange: "=azuresql||=azuresql-db"
1919

2020
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
2121

azure-sql/database/application-authentication-get-client-id-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
# Get the required values for authenticating an application to access Azure SQL Database from code
1717
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1818

19-
To create and manage an Azure SQL Database from code, you must register your app with Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)). The app must be registered in the same Microsoft Entra tenant as your Azure SQL Database resource.
19+
To create and manage an Azure SQL Database from code, you must register your app with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)). The app must be registered in the same Microsoft Entra tenant as your Azure SQL Database resource.
2020

2121

2222
## Create a service principal to access resources from an application

azure-sql/database/arm-templates-content-guide.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Resource Manager templates
3-
description: Use Azure Resource Manager templates to create and configure Azure SQL Database and Azure SQL Managed Instance.
43
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
4+
description: Use Azure Resource Manager templates to create and configure Azure SQL Database and Azure SQL Managed Instance.
55
author: urosmil
66
ms.author: urmilano
77
ms.reviewer: wiassaf, mathoma
@@ -10,6 +10,7 @@ ms.service: sql-db-mi
1010
ms.subservice: deployment-configuration
1111
ms.topic: conceptual
1212
ms.custom: overview-samples sqldbrb=2, devx-track-arm-template
13+
monikerRange: "= azuresql || = azuresql-db || = azuresql-mi"
1314
---
1415

1516
# Azure Resource Manager templates for Azure SQL Database & Azure SQL Managed Instance

azure-sql/database/audit-log-format.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: SQL Database audit log format
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: Understand how Azure SQL Database audit logs are structured.
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Audit to storage account behind VNet and firewall
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: Configure auditing to write database events on a storage account behind virtual network and firewall
45
author: sravanisaluru
56
ms.author: srsaluru
@@ -82,7 +83,7 @@ The sample scripts in this section require you to update the script before you r
8283

8384
To configure SQL Audit to write events to a storage account behind a VNet or Firewall:
8485

85-
1. Register your server with Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)). Use either PowerShell or REST API.
86+
1. Register your server with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)). Use either PowerShell or REST API.
8687

8788
**PowerShell**
8889

azure-sql/database/auditing-manage-using-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Manage Azure SQL Database Auditing using APIs
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: Use Azure SQL Database auditing to track database events into an audit log.
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/auditing-managed-identity.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Auditing using managed identity
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: How to use managed identity with storage accounts for auditing
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/auditing-microsoft-support-operations.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Auditing Microsoft support operations
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: How to use Auditing to audit Microsoft support operations.
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/auditing-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use SQL Database auditing to:
4444
- Enabling auditing on a paused **Azure Synapse SQL pool** isn't supported. To enable auditing, resume the **Synapse SQL pool**.
4545
- Enabling auditing by using User Assigned Managed Identity (UAMI) isn't supported on **Azure Synapse**.
4646
- Auditing for **Azure Synapse SQL pools** supports default audit action groups **only**.
47-
- When you configure auditing for a [logical server in Azure](logical-servers.md) or Azure SQL Database with the log destination as a storage account, the authentication mode must match the configuration for that storage account. If using storage access keys as the authentication type, the target storage account must be enabled with access to the storage account keys. If the storage account is configured to only use authentication with Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)), auditing can be configured to use managed identities for authentication.
47+
- When you configure auditing for a [logical server in Azure](logical-servers.md) or Azure SQL Database with the log destination as a storage account, the authentication mode must match the configuration for that storage account. If using storage access keys as the authentication type, the target storage account must be enabled with access to the storage account keys. If the storage account is configured to only use authentication with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), auditing can be configured to use managed identities for authentication.
4848

4949
## Remarks
5050

azure-sql/database/auditing-server-level-database-level.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Auditing policy at the server and database level
3+
titleSuffix: Azure SQL Database & Azure Synapse Analytics
34
description: This article explains the differences for Auditing policies of Azure SQL Database and Azure Synapse Analytics at the server and database level.
45
author: sravanisaluru
56
ms.author: srsaluru

azure-sql/database/authentication-aad-configure.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ monikerRange: "= azuresql || = azuresql-db || = azuresql-mi"
2222

2323
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
2424

25-
This article shows you how to create and populate a Microsoft Entra tenant, and use Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)) with [Azure SQL Database](sql-database-paas-overview.md), [Azure SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md), and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). For an overview, see [Microsoft Entra authentication](authentication-aad-overview.md).
25+
This article shows you how to create and populate a Microsoft Entra tenant, and use Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) with [Azure SQL Database](sql-database-paas-overview.md), [Azure SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md), and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). For an overview, see [Microsoft Entra authentication](authentication-aad-overview.md).
2626

2727
[!INCLUDE [entra-id](../includes/entra-id.md)]
2828

@@ -534,10 +534,10 @@ To use integrated Windows authentication, your domain's Active Directory must be
534534

535535
Your client application (or a service) connecting to the database must be running on a domain-joined machine under a user's domain credentials.
536536

537-
To connect to a database using integrated authentication and a Microsoft Entra identity, the Authentication keyword in the database connection string must be set to `Active Directory Integrated`. The following C# code sample uses ADO .NET.
537+
To connect to a database using integrated authentication and a Microsoft Entra identity, the Authentication keyword in the database connection string must be set to `Active Directory Integrated`. Replace `<database_name>` with your database name. The following C# code sample uses ADO .NET.
538538

539539
```csharp
540-
string ConnectionString = @"Data Source=n9lxnyuzhv.database.windows.net; Authentication=Active Directory Integrated; Initial Catalog=testdb;";
540+
string ConnectionString = @"Data Source=<database_name>.database.windows.net; Authentication=Active Directory Integrated; Initial Catalog=testdb;";
541541
SqlConnection conn = new SqlConnection(ConnectionString);
542542
conn.Open();
543543
```
@@ -548,11 +548,11 @@ The connection string keyword `Integrated Security=True` isn't supported for con
548548

549549
### Microsoft Entra password authentication
550550

551-
To connect to a database using Microsoft Entra cloud-only identity user accounts, or those who use Microsoft Entra hybrid identities, the Authentication keyword must be set to `Active Directory Password`. The connection string must contain User ID/UID and Password/PWD keywords and values. The following C# code sample uses ADO .NET.
551+
To connect to a database using Microsoft Entra cloud-only identity user accounts, or those who use Microsoft Entra hybrid identities, the Authentication keyword must be set to `Active Directory Password`. The connection string must contain User ID/UID and Password/PWD keywords and values. Replace `<database_name>`, `<email_address>`, and `<password>` with the appropriate values. The following C# code sample uses ADO .NET.
552552

553553
```csharp
554554
string ConnectionString =
555-
@"Data Source=n9lxnyuzhv.database.windows.net; Authentication=Active Directory Password; Initial Catalog=testdb; UID=bob@contoso.onmicrosoft.com; PWD=MyPassWord!";
555+
@"Data Source=<database_name>.database.windows.net; Authentication=Active Directory Password; Initial Catalog=testdb; UID=<email_address>; PWD=<password>";
556556
SqlConnection conn = new SqlConnection(ConnectionString);
557557
conn.Open();
558558
```
@@ -570,10 +570,10 @@ This authentication method allows middle-tier services to obtain [JSON Web Token
570570
3. Create a certificate on the client computer runs the application.
571571
4. Add the certificate as a key for your application.
572572

573-
Sample connection string:
573+
Sample connection string. Replace `<database_name>` with your database name:
574574

575575
```csharp
576-
string ConnectionString = @"Data Source=n9lxnyuzhv.database.windows.net; Initial Catalog=testdb;";
576+
string ConnectionString = @"Data Source=<database_name>.database.windows.net; Initial Catalog=testdb;";
577577
SqlConnection conn = new SqlConnection(ConnectionString);
578578
conn.AccessToken = "Your JWT token";
579579
conn.Open();

azure-sql/database/authentication-aad-directory-readers-role-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Assign Directory Readers role to a Microsoft Entra group and manage role assignments
3-
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
3+
titleSuffix: Azure SQL Database & Azure SQL Managed Instance & Azure Synapse Analytics
44
description: This article guides you through enabling the Directory Readers role using Microsoft Entra groups to manage Microsoft Entra role assignments with Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics
55
author: nofield
66
ms.author: nofield
@@ -17,7 +17,7 @@ monikerRange: "= azuresql || = azuresql-db || = azuresql-mi"
1717

1818
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
1919

20-
This article guides you through creating a group in Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)), and assigning that group the [**Directory Readers**](/azure/active-directory/roles/permissions-reference#directory-readers) role. The Directory Readers permissions allow the group owners to add additional members to the group, such as a [managed identity](/azure/active-directory/managed-identities-azure-resources/overview#managed-identity-types) of [Azure SQL Database](sql-database-paas-overview.md), [Azure SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md), and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). This bypasses the need for a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator) or [Privileged Role Administrator](/azure/active-directory/roles/permissions-reference#privileged-role-administrator) to assign the Directory Readers role directly for each [logical server](logical-servers.md) identity in the tenant.
20+
This article guides you through creating a group in Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), and assigning that group the [**Directory Readers**](/azure/active-directory/roles/permissions-reference#directory-readers) role. The Directory Readers permissions allow the group owners to add additional members to the group, such as a [managed identity](/azure/active-directory/managed-identities-azure-resources/overview#managed-identity-types) of [Azure SQL Database](sql-database-paas-overview.md), [Azure SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md), and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). This bypasses the need for a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator) or [Privileged Role Administrator](/azure/active-directory/roles/permissions-reference#privileged-role-administrator) to assign the Directory Readers role directly for each [logical server](logical-servers.md) identity in the tenant.
2121

2222
[!INCLUDE [entra-id](../includes/entra-id.md)]
2323

azure-sql/database/authentication-aad-directory-readers-role.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ monikerRange: "= azuresql || = azuresql-db || = azuresql-mi"
1717

1818
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
1919

20-
Microsoft Entra ID ([formerly Azure Active Directory](/azure/active-directory/fundamentals/new-name)) has introduced [using groups to manage role assignments](/azure/active-directory/roles/groups-concept). This allows for Microsoft Entra roles to be assigned to groups.
20+
Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)) has introduced [using groups to manage role assignments](/azure/active-directory/roles/groups-concept). This allows for Microsoft Entra roles to be assigned to groups.
2121

2222
> [!NOTE]
2323
> With [Microsoft Graph](/graph/overview) support for Azure SQL, the Directory Readers role can be replaced with using lower level permissions. For more information, see [User-assigned managed identity in Microsoft Entra for Azure SQL](authentication-azure-ad-user-assigned-managed-identity.md).

0 commit comments

Comments
 (0)