Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 16341e5

Browse files
authored
Merge pull request #7073 from MicrosoftDocs/release-sql2017
Publish changes for release-sql2017 CU10
2 parents b5dbd86 + 72e3491 commit 16341e5

5 files changed

Lines changed: 217 additions & 6 deletions

docs/linux/sql-server-linux-active-directory-auth-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@ The details for how to configure AD authentication are provided in the tutorial,
4747
## Known issues
4848

4949
- At this time, the only authentication method supported for database mirroring endpoint is CERTIFICATE. WINDOWS authentication method will be enabled in a future release.
50-
- Third-party AD tools like Centrify, Powerbroker, and Vintela are not supported.
5150

5251
## Next Steps
5352

docs/linux/sql-server-linux-active-directory-authentication.md

Lines changed: 38 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ This tutorial consists of the following tasks:
2929
> * Create AD-based logins in Transact-SQL
3030
> * Connect to [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] using AD Authentication
3131
32+
> [!NOTE]
33+
>
34+
> If you wish to configure [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux to use a third-party AD provider, please see [Use third-party Active Directory providers with SQL Server on Linux](./sql-server-linux-active-directory-third-party-providers.md).
35+
3236
## Prerequisites
3337

3438
Before you configure AD Authentication, you need to:
@@ -87,7 +91,7 @@ Use the following steps to join a [!INCLUDE[ssNoVersion](../includes/ssnoversion
8791
8892
Now check that your `/etc/resolv.conf` file contains a line like the following example:
8993
90-
```Code
94+
```/etc/resolv.conf
9195
nameserver **<AD domain controller IP address>**
9296
```
9397
@@ -109,7 +113,28 @@ Use the following steps to join a [!INCLUDE[ssNoVersion](../includes/ssnoversion
109113
110114
Now check that your `/etc/resolv.conf` file contains a line like the following example:
111115
112-
```Code
116+
```/etc/resolv.conf
117+
nameserver **<AD domain controller IP address>**
118+
```
119+
120+
- **SLES**:
121+
122+
Edit the `/etc/sysconfig/network/config` file so that your AD domain controller IP will be used for DNS queries and the your AD domain is in the domain search list:
123+
124+
```/etc/sysconfig/network/config
125+
<...>
126+
NETCONFIG_DNS_STATIC_SERVERS="**<AD domain controller IP address>**"
127+
```
128+
129+
After editing this file, restart the network service:
130+
131+
```bash
132+
sudo systemctl restart network
133+
```
134+
135+
Now check that your `/etc/resolv.conf` file contains a line like the following example:
136+
137+
```/etc/resolv.conf
113138
nameserver **<AD domain controller IP address>**
114139
```
115140
@@ -301,19 +326,27 @@ The specific connection string parameter for clients to use AD Authentication de
301326
Make sure you've installed the [mssql-tools](sql-server-linux-setup-tools.md) package, then connect using `sqlcmd` without specifying any credentials:
302327

303328
```bash
304-
sqlcmd -S mssql.contoso.com
329+
sqlcmd -S mssql-host.contoso.com
305330
```
306331

307332
* SSMS on a domain-joined Windows client
308333

309-
Log in to a domain-joined Windows client using your domain credentials. Make sure [!INCLUDE[ssmanstudiofull-md](../includes/ssmanstudiofull-md.md)] is installed, then connect to your [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] instance by specifying **Windows Authentication** in the **Connect to Server** dialog.
334+
Log in to a domain-joined Windows client using your domain credentials. Make sure [!INCLUDE[ssmanstudiofull-md](../includes/ssmanstudiofull-md.md)] is installed, then connect to your [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] instance (e.g. "mssql-host.contoso.com") by specifying **Windows Authentication** in the **Connect to Server** dialog.
310335

311336
* AD Authentication using other client drivers
312337

313338
* JDBC: [Using Kerberos Integrated Authentication to Connect SQL Server](https://docs.microsoft.com/sql/connect/jdbc/using-kerberos-integrated-authentication-to-connect-to-sql-server)
314339
* ODBC: [Using Integrated Authentication](https://docs.microsoft.com/sql/connect/odbc/linux/using-integrated-authentication)
315340
* ADO.NET: [Connection String Syntax](https://msdn.microsoft.com/library/system.data.sqlclient.sqlauthenticationmethod(v=vs.110).aspx)
316-
341+
342+
## Performance Improvements
343+
If you notice that AD account lookups are taking a while, and you have checked you AD configuration is valid with the steps at [Use Active Directory Authentication with SQL Server on Linux through Third-Party AD Providers](sql-server-linux-active-directory-third-party-providers.md), you can add the lines below to `/var/opt/mssql/mssql.conf` to skip SSSD calls and directly use LDAP calls.
344+
345+
```/var/opt/mssql/mssql.conf
346+
[network]
347+
disablesssd = true
348+
```
349+
317350
## Next steps
318351

319352
In this tutorial, we walked through how to set up Active Directory authentication with SQL Server on Linux. You learned how to:
Lines changed: 162 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,162 @@
1+
---
2+
title: Use third-party Active Directory providers with SQL Server on Linux | Microsoft Docs
3+
description: This tutorial provides the configuration steps for AD Authentication with third-party providers
4+
author: dylan-MSFT
5+
ms.date: 07/25/2018
6+
ms.author: dygray
7+
manager: mikehab
8+
ms.topic: conceptual
9+
ms.prod: sql
10+
ms.component: ""
11+
ms.suite: "sql"
12+
ms.custom: "sql-linux"
13+
ms.technology: linux
14+
helpviewer_keywords:
15+
- "Linux, AD authentication"
16+
---
17+
# Use third-party Active Directory providers with SQL Server on Linux
18+
19+
[!INCLUDE[appliesto-ss-xxxx-xxxx-xxx-md-linuxonly](../includes/appliesto-ss-xxxx-xxxx-xxx-md-linuxonly.md)]
20+
21+
This article explains how to configure a [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux host machine with AD Authentication when using third-party AD providers, such as [PowerBroker Identity Services (PBIS)](https://www.beyondtrust.com/), [Vintela Authentication Services (VAS)](https://www.oneidentity.com/products/authentication-services/), and [Centrify](https://www.centrify.com/). This guide includes steps to check your AD configuration, and it is not intended to instruct on how to join a machine to a domain. For detailed instructions on joining a [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] host to a domain using REALM and SSSD, see [Use Active Directory authentication with SQL Server on Linux](sql-server-linux-active-directory-authentication.md).
22+
23+
## Prerequisites
24+
25+
Before you configure AD Authentication, you need to set up an AD Domain Controller (Windows) on your network and join your [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux host to an AD domain. You can use [PBIS](https://www.beyondtrust.com/), [VAS](https://www.oneidentity.com/products/authentication-services/), or [Centrify](https://www.centrify.com/).
26+
27+
> [!NOTE]
28+
>
29+
>This tutorial uses "contoso.com" and "CONTOSO.COM" as example domain and realm names respectively. It also uses "DC1.CONTOSO.COM" as the example fully qualified domain name of the domain controller. You should replace these with your own values.
30+
31+
## Check Connection to Domain Controller
32+
33+
Check you can contact the domain controller with both the short and fully qualified name of the domain.
34+
35+
```bash
36+
ping contoso
37+
38+
ping contoso.com
39+
```
40+
41+
If either of these fails, update your domain search list.
42+
43+
- **Ubuntu**:
44+
45+
Edit the `/etc/network/interfaces` file so that your AD Domain is in the domain search list:
46+
47+
```/etc/network/interfaces
48+
<...>
49+
# The primary network interface
50+
auto eth0
51+
iface eth0 inet dhcp
52+
dns-nameservers **<AD domain controller IP address>**
53+
dns-search **<AD domain name>**
54+
```
55+
56+
> [!NOTE]
57+
> The network interface (eth0) might differ for different machines. To find out which one you are using, run ifconfig and copy the interface that has an IP address and transmitted and received bytes.
58+
59+
After editing this file, restart the network service:
60+
61+
```bash
62+
sudo ifdown eth0 && sudo ifup eth0
63+
```
64+
65+
Now check that your `/etc/resolv.conf` file contains a line like the following example:
66+
67+
```/etc/resolv.conf
68+
search contoso.com com
69+
nameserver **<AD domain controller IP address>**
70+
```
71+
72+
- **RHEL**:
73+
74+
Edit the `/etc/sysconfig/network-scripts/ifcfg-eth0` file (or other interface config file as appropriate) so that your AD Domain is in the domain search list:
75+
76+
```/etc/sysconfig/network-scripts/ifcfg-eth0
77+
<...>
78+
PEERDNS=no
79+
DNS1=**<AD domain controller IP address>**
80+
DOMAIN="contoso.com com"
81+
```
82+
83+
After editing this file, restart the network service:
84+
85+
```bash
86+
sudo systemctl restart network
87+
```
88+
89+
Now check that your `/etc/resolv.conf` file contains a line like the following example:
90+
91+
```/etc/resolv.conf
92+
search contoso.com com
93+
nameserver **<AD domain controller IP address>**
94+
```
95+
96+
If you still cannot ping the domain controller, find the fully qualified domain name (e.g. DC1.CONTOSO.COM) and IP address of the domain controller and add the following entry to `/etc/hosts`
97+
98+
```/etc/hosts
99+
**<IP address>** DC1.CONTOSO.COM CONTOSO.COM CONTOSO
100+
```
101+
102+
- **SLES**:
103+
104+
Edit the `/etc/sysconfig/network/config` file so that your AD domain controller IP will be used for DNS queries and your AD domain is in the domain search list:
105+
106+
```/etc/sysconfig/network/config
107+
<...>
108+
NETCONFIG_DNS_STATIC_SEARCHLIST=""
109+
NETCONFIG_DNS_STATIC_SERVERS="**<AD domain controller IP address>**"
110+
```
111+
112+
After editing this file, restart the network service:
113+
```bash
114+
sudo systemctl restart network
115+
```
116+
117+
Now check that your `/etc/resolv.conf` file contains a line like the following example:
118+
119+
```/etc/resolv.conf
120+
search contoso.com com
121+
nameserver **<AD domain controller IP address>**
122+
```
123+
124+
## Check Reverse DNS is properly configured
125+
126+
The following command should return the fully qualified domain name of the host running SQL Server (e.g. "SqlHost.contoso.com").
127+
128+
```bash
129+
host **<IP address of SQL Server host>**
130+
# **<reversed IP address>**.in-addr.arpa domain name pointerSqlHost.contoso.com.
131+
```
132+
133+
If this does not return your host's FQDN or if the FQDN is incorrect, add a reverse DNS entry for your [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux host to your DNS server.
134+
135+
## Check your KRB5 configuration is correct
136+
137+
Check your `/etc/krb5.conf` is configured correctly. For most third-party AD providers, this is done automatically. However, check `/etc/krb5.conf` for the following values to prevent any future issues:
138+
139+
```/etc/krb5.conf
140+
[libdefaults]
141+
default_realm = CONTOSO.COM
142+
143+
[realms]
144+
CONTOSO.COM = {
145+
}
146+
147+
[domain_realm]
148+
contoso.com = CONTOSO.COM
149+
.contoso.com = CONTOSO.COM
150+
```
151+
152+
## Next steps
153+
154+
In this article, we covered how to configure a [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux host machine with AD Authentication when using third-party AD providers. To finish configuring [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux to support AD accounts, follow the instructions at [Use Active Directory authentication with SQL Server on Linux](sql-server-linux-active-directory-authentication.md).
155+
156+
> [!div class="nextstepaction"]
157+
> [Use Active Directory authentication with SQL Server on Linux](sql-server-linux-active-directory-authentication.md)
158+
159+
> [!NOTE]
160+
>
161+
> You can skip the "Join SQL Server host to AD domain" section in [Use Active Directory authentication with SQL Server on Linux](sql-server-linux-active-directory-authentication.md)
162+
as you have just done that in this tutorial.

docs/linux/sql-server-linux-release-notes.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ The following table lists the release history for SQL Server 2017.
4141

4242
| Release | Version | Release date |
4343
|-----------------------|---------------|--------------|
44+
| [CU10](#CU10) | 14.0.3037.1 | 2018-08-27 |
4445
| [CU9-GDR2](#CU9-GDR2) | 14.0.3035.2 | 2018-08-18 |
4546
| [GDR2](#GDR2) | 14.0.2002.14 | 2018-08-18 |
4647
| [CU9](#CU9) | 14.0.3030.27 | 2018-07-18 |
@@ -66,6 +67,20 @@ If you are updating existing SQL Server packages, run the appropriate update com
6667
- [Install SQL Server Integration Services](sql-server-linux-setup-ssis.md)
6768
- [Enable SQL Server Agent](sql-server-linux-setup-sql-agent.md)
6869

70+
## <a id="CU10"></a> CU10 (August 2018)
71+
72+
This is the Cumulative Update 10 (CU10) release of SQL Server 2017. The SQL Server engine version for this release is 14.0.3037.1. For information about the fixes and improvements in this release, see [https://support.microsoft.com/en-us/help/4342123](https://support.microsoft.com/en-us/help/4342123).
73+
74+
### Package details
75+
76+
For manual or offline package installations, you can download the RPM and Debian packages with the information in the following table:
77+
78+
| Package | Package version | Downloads |
79+
|-----|-----|-----|
80+
| Red Hat RPM package | 14.0.3037.1-2 | [Engine RPM package](https://packages.microsoft.com/rhel/7/mssql-server-2017/mssql-server-14.0.3037.1-2.x86_64.rpm)</br>[High Availability RPM package](https://packages.microsoft.com/rhel/7/mssql-server-2017/mssql-server-ha-14.0.3037.1-2.x86_64.rpm)</br>[Full-text Search RPM package](https://packages.microsoft.com/rhel/7/mssql-server-2017/mssql-server-fts-14.0.3037.1-2.x86_64.rpm)</br>[SSIS package](https://packages.microsoft.com/rhel/7/mssql-server-2017/mssql-server-is-14.0.1000.169-1.x86_64.rpm) |
81+
| SLES RPM package | 14.0.3037.1-2 | [mssql-server Engine RPM package](https://packages.microsoft.com/sles/12/mssql-server-2017/mssql-server-14.0.3037.1-2.x86_64.rpm)</br>[High Availability RPM package](https://packages.microsoft.com/sles/12/mssql-server-2017/mssql-server-ha-14.0.3037.1-2.x86_64.rpm)</br>[Full-text Search RPM package](https://packages.microsoft.com/sles/12/mssql-server-2017/mssql-server-fts-14.0.3037.1-2.x86_64.rpm) |
82+
| Ubuntu 16.04 Debian package | 14.0.3037.1-2 | [Engine Debian package](https://packages.microsoft.com/ubuntu/16.04/mssql-server-2017/pool/main/m/mssql-server/mssql-server_14.0.3037.1-2_amd64.deb)</br>[High Availability Debian package](https://packages.microsoft.com/ubuntu/16.04/mssql-server-2017/pool/main/m/mssql-server-ha/mssql-server-ha_14.0.3037.1-2_amd64.deb)</br>[Full-text Search Debian package](https://packages.microsoft.com/ubuntu/16.04/mssql-server-2017/pool/main/m/mssql-server-fts/mssql-server-fts_14.0.3037.1-2_amd64.deb)<br/>[SSIS package](https://packages.microsoft.com/ubuntu/16.04/mssql-server-2017/pool/main/m/mssql-server-is/mssql-server-is_14.0.1000.169-1_amd64.deb) |
83+
6984
## <a id="CU9-GDR2"></a> CU9-GDR2 (August 2018)
7085

7186
This is a security update that also includes the previously released CU (CU9) for SQL Server 2017. The SQL Server engine version for this release is 14.0.3035.2. For information about the fixes and improvements in this release, see [https://support.microsoft.com/en-us/help/4293805](https://support.microsoft.com/en-us/help/4293805).

docs/linux/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,8 @@
173173
href: sql-server-linux-active-directory-auth-overview.md
174174
- name: Encrypting connections
175175
href: sql-server-linux-encrypted-connections.md
176+
- name: Third Party AD Auth
177+
href: sql-server-linux-active-directory-third-party-providers.md
176178
- name: Performance
177179
items:
178180
- name: Best practices

0 commit comments

Comments
 (0)