You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/connectivity-settings.md
+68-23Lines changed: 68 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
10
10
author: rohitnayakmsft
11
11
ms.author: rohitna
12
12
ms.reviewer: wiassaf, mathoma, vanto
13
-
ms.date: 08/03/2021
13
+
ms.date: 07/14/2022
14
14
ms.custom:
15
15
- "devx-track-azurepowershell"
16
16
- "devx-track-azurecli"
@@ -23,21 +23,20 @@ ms.devlang:
23
23
24
24
This article introduces settings that control connectivity to the server for Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server.
25
25
26
-
> [!IMPORTANT]
27
-
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
28
26
29
-
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the following screenshot:
27
+
You can change these settings from the networking tab of your [logical server](logical-servers.md):
30
28
31
-
:::image type="content" source="media/single-database-create-quickstart/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server":::
29
+
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server.":::
30
+
31
+
> [!IMPORTANT]
32
+
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
32
33
33
-
> [!NOTE]
34
-
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
35
34
36
35
## Deny public network access
37
36
38
-
The default for this setting is **No** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
37
+
The default for the **Connectivity method**setting is **No access** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
39
38
40
-
When **Deny public network access** is set to **Yes**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
39
+
When **Connectivity method** is set to **No access**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
41
40
42
41
```output
43
42
Error 47073
@@ -46,16 +45,37 @@ The public network interface on this server is not accessible.
46
45
To connect to this server, use the Private Endpoint from inside your virtual network.
47
46
```
48
47
49
-
When **Deny public network access** is set to **Yes**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
48
+
When **Connectivity method** is set to **No access**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
50
49
51
50
```output
52
51
Error 42101
53
52
Unable to create or modify firewall rules when public network interface for the server is disabled.
54
53
To manage server or database level firewall rules, please enable the public network interface.
55
54
```
56
-
Ensure that **Deny public network access** is set to **No** to be able to add, remove or edit any firewall rules for Azure Sql
57
55
58
-
## Change public network access via PowerShell
56
+
Ensure that **Connectivity method** is set to **Public endpoint** or **Private endpoint** to be able to add, remove or edit any firewall rules for Azure SQL Database and Azure Synapse Analytics.
57
+
58
+
## Change public network access
59
+
60
+
It's possible to change the public network access via the Azure portal, Azure PowerShell, and the Azure CLI.
61
+
62
+
### [Portal](#tab/azure-portal)
63
+
64
+
To enable public network access for the logical server hosting your databases, go to the **Networking page** in the [Azure portal](https://portal.azure.com), choose the **Public access** tab, and then set the **Public network access** to **Select networks**.
65
+
66
+
67
+
From this page, you can add a virtual network rule, as well as configure firewall rules for your public endpoint.
68
+
69
+
Choose the **Private access** tab to configure a [private endpoint](private-endpoint-overview.md).
70
+
71
+
72
+
> [!NOTE]
73
+
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
74
+
75
+
### [PowerShell](#tab/azure-powershell)
76
+
77
+
It's possible to change public network access by using Azure PowerShell.
78
+
59
79
60
80
> [!IMPORTANT]
61
81
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
It's possible to change the public network settings by using the Azure CLI.
76
98
77
99
> [!IMPORTANT]
78
100
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
79
101
80
-
### Azure CLI in a Bash shell
81
-
82
102
The following CLI script shows how to change the **Public Network Access** setting in a Bash shell:
83
103
84
104
```azurecli-interactive
@@ -90,9 +110,11 @@ az sql server show -n sql-server-name -g sql-server-group --query "publicNetwork
90
110
az sql server update -n sql-server-name -g sql-server-group --set publicNetworkAccess="Disabled"
91
111
```
92
112
113
+
---
114
+
93
115
## Minimal TLS version
94
116
95
-
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses.
117
+
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses. It's possible to change the minimum TLS version by using the Azure portal, Azure PowerShell, and the Azure CLI.
96
118
97
119
Currently, we support TLS 1.0, 1.1, and 1.2. Setting a minimal TLS version ensures that newer TLS versions are supported. For example, choosing a TLS version 1.1 means only connections with TLS 1.1 and 1.2 are accepted, and connections with TLS 1.0 are rejected. After you test to confirm that your applications support it, we recommend setting the minimal TLS version to 1.2. This version includes fixes for vulnerabilities in previous versions and is the highest version of TLS that's supported in Azure SQL Database.
98
120
@@ -110,11 +132,15 @@ Error 47072
110
132
Login failed with invalid TLS version
111
133
```
112
134
113
-
##Set the minimal TLS version in Azure portal
135
+
### [Portal](#tab/azure-portal)
114
136
115
-
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Firewalls and virtual networks**. Select the **Minimum TLS Version** desired for all SQL Databases associated with the server, and select **Save**.
137
+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Select the **Minimum TLS Version** desired for all databases associated with the server, and select **Save**.
116
138
117
-
## Set the minimal TLS version via PowerShell
139
+
:::image type="content" source="media/connectivity-settings/minimal-tls-version.png" alt-text="Screenshot of the Connectivity tab of the Networking settings for your logical server, minimal TLS version drop-down selected." lightbox="media/connectivity-settings/minimal-tls-version.png":::
140
+
141
+
### [PowerShell](#tab/azure-powershell)
142
+
143
+
It's possible to change the minimum TLS version by using Azure PowerShell.
118
144
119
145
> [!IMPORTANT]
120
146
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
It's possible to change the minimum TLS settings by using the Azure CLI.
135
163
136
164
> [!IMPORTANT]
137
165
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
138
166
139
-
### Azure CLI in a Bash shell
140
167
141
168
The following CLI script shows how to change the **Minimal TLS Version** setting in a Bash shell:
142
169
@@ -148,11 +175,25 @@ az sql server show -n sql-server-name -g sql-server-group --query "minimalTlsVer
148
175
az sql server update -n sql-server-name -g sql-server-group --set minimalTlsVersion="1.2"
149
176
```
150
177
178
+
---
179
+
151
180
## Change the connection policy
152
181
153
182
[Connection policy](connectivity-architecture.md#connection-policy) determines how customers connect to Azure SQL Database.
154
183
155
-
## Change the connection policy via PowerShell
184
+
It's possible to change the connection policy by using the Azure portal, Azure PowerShell, and the Azure CLI.
185
+
186
+
### [Portal](#tab/azure-portal)
187
+
188
+
It's possible to change your connection policy for your logical server by using the Azure portal.
189
+
190
+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Choose the desired connection policy, and select **Save**.
191
+
192
+
:::image type="content" source="media/connectivity-settings/change-connection-policy.png" alt-text="Screenshot of the Connectivity tab of the Networking page, Connection policy selected.":::
193
+
194
+
### [PowerShell](#tab/azure-powershell)
195
+
196
+
It's possible to change the connection policy for your logical server by using Azure PowerShell.
156
197
157
198
> [!IMPORTANT]
158
199
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
Copy file name to clipboardExpand all lines: azure-sql/database/firewall-create-server-level-portal-quickstart.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: quickstart
8
8
author: rohitnayakmsft
9
9
ms.author: rohitna
10
10
ms.reviewer: kendralittle, mathoma, vanto
11
-
ms.date: 06/06/2022
11
+
ms.date: 07/14/2022
12
12
ms.custom: kr2b-contr-experiment
13
13
---
14
14
# Quickstart: Create a server-level firewall rule in Azure portal
@@ -35,27 +35,27 @@ Sign in to [Azure portal](https://portal.azure.com/).
35
35
36
36
We'll use the following steps to create a server-level IP-based, firewall rule for a specific, client IP address. This enables external connectivity for that IP address through the Azure SQL Database firewall.
37
37
38
-
1. After the [database](#prerequisites) deployment completes, select **SQL databases** from the left-hand menu and then select **mySampleDatabase** on the **SQL databases** page. The overview page for your database opens. It displays the fully qualified server name (such as **mynewserver-20170824.database.windows.net**) and provides options for further configuration.
38
+
1. After the [database](#prerequisites) deployment completes, select **SQL databases** from the left-hand menu and then select **mySampleDatabase** on the **SQL databases** page. The overview page for your database opens. It displays the fully qualified server name (such as **mydocssampleserver.database.windows.net**) and provides options for further configuration. You can also find the firewall settings by navigating directly to your server, and selecting **Networking** under **Security**.
39
39
40
-
2. Copy the fully qualified server name. You will use it when you connect to your server and its databases in other quickstarts.
40
+
2. Copy the fully qualified server name. You will use it when you connect to your server and its databases in other quickstarts. Select **Set server firewall** on the toolbar.
41
41
42
-
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-name.png" alt-text="A screenshot that shows where to copy your server name.":::
42
+
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-name.png" alt-text="A screenshot that shows where to copy your server name, and how to set server firewall on the toolbar." lightbox="./media/firewall-create-server-level-portal-quickstart/server-name.png":::
43
43
44
-
3.Select**Set server firewall**on the toolbar. The **Firewall settings** page for the server opens.
44
+
3.Set**Public network access**to **Selected networks** to reveal the virtual networks and firewall rules. When set to **Disabled**, virtual networks and firewall rule settings are hidden.
45
45
46
-
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png" alt-text="A screenshot that shows configuration of a server-level IP firewall rule.":::
46
+
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png" alt-text="A screenshot that shows configuration of a server-level IP firewall rule." lightbox="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png":::
47
47
48
-
4. Choose **Add client IP**on the toolbar to add your current IP address to a new, server-level, firewall rule. This rule can open Port 1433 for a single IP address or for a range of IP addresses.
48
+
4. Choose **Add your client IP** to add your current IP address to a new, server-level, firewall rule. This rule can open Port 1433 for a single IP address or for a range of IP addresses. You can also configure firewall settings by choosing **Add a firewall rule**.
49
49
50
50
> [!IMPORTANT]
51
51
> By default, access through the Azure SQL Database firewall is disabled for all Azure services. Choose **ON** on this page to enable access for all Azure services.
52
52
>
53
53
54
54
5. Select **Save**. Port 1433 is now open on the server and a server-level IP-based, firewall rule is created for your current IP address.
55
55
56
-
6. Close the **Firewall settings** page.
56
+
6. Close the **Networking** page.
57
57
58
-
Open SQL Server Management Studio or another tool of your choice. Use the server admin account you created earlier to connect to the server and its databases from your IP address.
58
+
Open SQL Server Management Studio or another tool of your choice. Use the server admin account you created earlier to connect to the server and its databases from your IP address.
59
59
60
60
7. Save the resources from this quickstart to complete additional SQL database tutorials.
0 commit comments