Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 82ff8f6

Browse files
authored
Merge branch 'MicrosoftDocs:main' into mc-release-dallas
2 parents c63f68f + 5fc7782 commit 82ff8f6

39 files changed

Lines changed: 1039 additions & 920 deletions

File tree

azure-sql/database/connectivity-settings.md

Lines changed: 68 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
author: rohitnayakmsft
1111
ms.author: rohitna
1212
ms.reviewer: wiassaf, mathoma, vanto
13-
ms.date: 08/03/2021
13+
ms.date: 07/14/2022
1414
ms.custom:
1515
- "devx-track-azurepowershell"
1616
- "devx-track-azurecli"
@@ -23,21 +23,20 @@ ms.devlang:
2323

2424
This article introduces settings that control connectivity to the server for Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server.
2525

26-
> [!IMPORTANT]
27-
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
2826

29-
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the following screenshot:
27+
You can change these settings from the networking tab of your [logical server](logical-servers.md):
3028

31-
:::image type="content" source="media/single-database-create-quickstart/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server":::
29+
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server.":::
30+
31+
> [!IMPORTANT]
32+
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
3233
33-
> [!NOTE]
34-
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
3534

3635
## Deny public network access
3736

38-
The default for this setting is **No** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
37+
The default for the **Connectivity method** setting is **No access** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
3938

40-
When **Deny public network access** is set to **Yes**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
39+
When **Connectivity method** is set to **No access**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
4140

4241
```output
4342
Error 47073
@@ -46,16 +45,37 @@ The public network interface on this server is not accessible.
4645
To connect to this server, use the Private Endpoint from inside your virtual network.
4746
```
4847

49-
When **Deny public network access** is set to **Yes**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
48+
When **Connectivity method** is set to **No access**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
5049

5150
```output
5251
Error 42101
5352
Unable to create or modify firewall rules when public network interface for the server is disabled.
5453
To manage server or database level firewall rules, please enable the public network interface.
5554
```
56-
Ensure that **Deny public network access** is set to **No** to be able to add, remove or edit any firewall rules for Azure Sql
5755

58-
## Change public network access via PowerShell
56+
Ensure that **Connectivity method** is set to **Public endpoint** or **Private endpoint** to be able to add, remove or edit any firewall rules for Azure SQL Database and Azure Synapse Analytics.
57+
58+
## Change public network access
59+
60+
It's possible to change the public network access via the Azure portal, Azure PowerShell, and the Azure CLI.
61+
62+
### [Portal](#tab/azure-portal)
63+
64+
To enable public network access for the logical server hosting your databases, go to the **Networking page** in the [Azure portal](https://portal.azure.com), choose the **Public access** tab, and then set the **Public network access** to **Select networks**.
65+
66+
67+
From this page, you can add a virtual network rule, as well as configure firewall rules for your public endpoint.
68+
69+
Choose the **Private access** tab to configure a [private endpoint](private-endpoint-overview.md).
70+
71+
72+
> [!NOTE]
73+
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
74+
75+
### [PowerShell](#tab/azure-powershell)
76+
77+
It's possible to change public network access by using Azure PowerShell.
78+
5979

6080
> [!IMPORTANT]
6181
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -72,13 +92,13 @@ $SecureString = ConvertTo-SecureString "password" -AsPlainText -Force
7292
Set-AzSqlServer -ServerName sql-server-name -ResourceGroupName sql-server-group -SqlAdministratorPassword $SecureString -PublicNetworkAccess "Disabled"
7393
```
7494

75-
## Change public network access via CLI
95+
### [Azure CLI](#tab/azure-cli)
96+
97+
It's possible to change the public network settings by using the Azure CLI.
7698

7799
> [!IMPORTANT]
78100
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
79101
80-
### Azure CLI in a Bash shell
81-
82102
The following CLI script shows how to change the **Public Network Access** setting in a Bash shell:
83103

84104
```azurecli-interactive
@@ -90,9 +110,11 @@ az sql server show -n sql-server-name -g sql-server-group --query "publicNetwork
90110
az sql server update -n sql-server-name -g sql-server-group --set publicNetworkAccess="Disabled"
91111
```
92112

113+
---
114+
93115
## Minimal TLS version
94116

95-
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses.
117+
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses. It's possible to change the minimum TLS version by using the Azure portal, Azure PowerShell, and the Azure CLI.
96118

97119
Currently, we support TLS 1.0, 1.1, and 1.2. Setting a minimal TLS version ensures that newer TLS versions are supported. For example, choosing a TLS version 1.1 means only connections with TLS 1.1 and 1.2 are accepted, and connections with TLS 1.0 are rejected. After you test to confirm that your applications support it, we recommend setting the minimal TLS version to 1.2. This version includes fixes for vulnerabilities in previous versions and is the highest version of TLS that's supported in Azure SQL Database.
98120

@@ -110,11 +132,15 @@ Error 47072
110132
Login failed with invalid TLS version
111133
```
112134

113-
## Set the minimal TLS version in Azure portal
135+
### [Portal](#tab/azure-portal)
114136

115-
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Firewalls and virtual networks**. Select the **Minimum TLS Version** desired for all SQL Databases associated with the server, and select **Save**.
137+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Select the **Minimum TLS Version** desired for all databases associated with the server, and select **Save**.
116138

117-
## Set the minimal TLS version via PowerShell
139+
:::image type="content" source="media/connectivity-settings/minimal-tls-version.png" alt-text="Screenshot of the Connectivity tab of the Networking settings for your logical server, minimal TLS version drop-down selected." lightbox="media/connectivity-settings/minimal-tls-version.png":::
140+
141+
### [PowerShell](#tab/azure-powershell)
142+
143+
It's possible to change the minimum TLS version by using Azure PowerShell.
118144

119145
> [!IMPORTANT]
120146
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -131,12 +157,13 @@ $SecureString = ConvertTo-SecureString "password" -AsPlainText -Force
131157
Set-AzSqlServer -ServerName sql-server-name -ResourceGroupName sql-server-group -SqlAdministratorPassword $SecureString -MinimalTlsVersion "1.2"
132158
```
133159

134-
## Set the minimal TLS version via the Azure CLI
160+
### [Azure CLI](#tab/azure-cli)
161+
162+
It's possible to change the minimum TLS settings by using the Azure CLI.
135163

136164
> [!IMPORTANT]
137165
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
138166
139-
### Azure CLI in a Bash shell
140167

141168
The following CLI script shows how to change the **Minimal TLS Version** setting in a Bash shell:
142169

@@ -148,11 +175,25 @@ az sql server show -n sql-server-name -g sql-server-group --query "minimalTlsVer
148175
az sql server update -n sql-server-name -g sql-server-group --set minimalTlsVersion="1.2"
149176
```
150177

178+
---
179+
151180
## Change the connection policy
152181

153182
[Connection policy](connectivity-architecture.md#connection-policy) determines how customers connect to Azure SQL Database.
154183

155-
## Change the connection policy via PowerShell
184+
It's possible to change the connection policy by using the Azure portal, Azure PowerShell, and the Azure CLI.
185+
186+
### [Portal](#tab/azure-portal)
187+
188+
It's possible to change your connection policy for your logical server by using the Azure portal.
189+
190+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Choose the desired connection policy, and select **Save**.
191+
192+
:::image type="content" source="media/connectivity-settings/change-connection-policy.png" alt-text="Screenshot of the Connectivity tab of the Networking page, Connection policy selected.":::
193+
194+
### [PowerShell](#tab/azure-powershell)
195+
196+
It's possible to change the connection policy for your logical server by using Azure PowerShell.
156197

157198
> [!IMPORTANT]
158199
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -173,7 +214,9 @@ $id="$sqlserverid/connectionPolicies/Default"
173214
Set-AzResource -ResourceId $id -Properties @{"connectionType" = "Proxy"} -f
174215
```
175216

176-
## Change the connection policy via the Azure CLI
217+
### [Azure CLI](#tab/azure-cli)
218+
219+
It's possible to change the connection policy for your logical server by using the Azure CLI.
177220

178221
> [!IMPORTANT]
179222
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
@@ -211,6 +254,8 @@ az resource show --ids %sqlserverid%
211254
az resource update --ids %sqlserverid% --set properties.connectionType=Proxy
212255
```
213256

257+
---
258+
214259
## Next steps
215260

216261
- For an overview of how connectivity works in Azure SQL Database, refer to [Connectivity architecture](connectivity-architecture.md).

azure-sql/database/firewall-create-server-level-portal-quickstart.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: quickstart
88
author: rohitnayakmsft
99
ms.author: rohitna
1010
ms.reviewer: kendralittle, mathoma, vanto
11-
ms.date: 06/06/2022
11+
ms.date: 07/14/2022
1212
ms.custom: kr2b-contr-experiment
1313
---
1414
# Quickstart: Create a server-level firewall rule in Azure portal
@@ -35,27 +35,27 @@ Sign in to [Azure portal](https://portal.azure.com/).
3535
3636
We'll use the following steps to create a server-level IP-based, firewall rule for a specific, client IP address. This enables external connectivity for that IP address through the Azure SQL Database firewall.
3737

38-
1. After the [database](#prerequisites) deployment completes, select **SQL databases** from the left-hand menu and then select **mySampleDatabase** on the **SQL databases** page. The overview page for your database opens. It displays the fully qualified server name (such as **mynewserver-20170824.database.windows.net**) and provides options for further configuration.
38+
1. After the [database](#prerequisites) deployment completes, select **SQL databases** from the left-hand menu and then select **mySampleDatabase** on the **SQL databases** page. The overview page for your database opens. It displays the fully qualified server name (such as **mydocssampleserver.database.windows.net**) and provides options for further configuration. You can also find the firewall settings by navigating directly to your server, and selecting **Networking** under **Security**.
3939

40-
2. Copy the fully qualified server name. You will use it when you connect to your server and its databases in other quickstarts.
40+
2. Copy the fully qualified server name. You will use it when you connect to your server and its databases in other quickstarts. Select **Set server firewall** on the toolbar.
4141

42-
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-name.png" alt-text="A screenshot that shows where to copy your server name.":::
42+
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-name.png" alt-text="A screenshot that shows where to copy your server name, and how to set server firewall on the toolbar." lightbox="./media/firewall-create-server-level-portal-quickstart/server-name.png":::
4343

44-
3. Select **Set server firewall** on the toolbar. The **Firewall settings** page for the server opens.
44+
3. Set **Public network access** to **Selected networks** to reveal the virtual networks and firewall rules. When set to **Disabled**, virtual networks and firewall rule settings are hidden.
4545

46-
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png" alt-text="A screenshot that shows configuration of a server-level IP firewall rule.":::
46+
:::image type="content" source="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png" alt-text="A screenshot that shows configuration of a server-level IP firewall rule." lightbox="./media/firewall-create-server-level-portal-quickstart/server-firewall-rule.png":::
4747

48-
4. Choose **Add client IP** on the toolbar to add your current IP address to a new, server-level, firewall rule. This rule can open Port 1433 for a single IP address or for a range of IP addresses.
48+
4. Choose **Add your client IP** to add your current IP address to a new, server-level, firewall rule. This rule can open Port 1433 for a single IP address or for a range of IP addresses. You can also configure firewall settings by choosing **Add a firewall rule**.
4949

5050
> [!IMPORTANT]
5151
> By default, access through the Azure SQL Database firewall is disabled for all Azure services. Choose **ON** on this page to enable access for all Azure services.
5252
>
5353
5454
5. Select **Save**. Port 1433 is now open on the server and a server-level IP-based, firewall rule is created for your current IP address.
5555

56-
6. Close the **Firewall settings** page.
56+
6. Close the **Networking** page.
5757

58-
Open SQL Server Management Studio or another tool of your choice. Use the server admin account you created earlier to connect to the server and its databases from your IP address.
58+
Open SQL Server Management Studio or another tool of your choice. Use the server admin account you created earlier to connect to the server and its databases from your IP address.
5959

6060
7. Save the resources from this quickstart to complete additional SQL database tutorials.
6161

0 commit comments

Comments
 (0)