You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/xevent-db-diff-from-svr.md
+5-1Lines changed: 5 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Describes extended events (XEvents) in Azure SQL Database, and how
4
4
author: WilliamDAssafMSFT
5
5
ms.author: wiassaf
6
6
ms.reviewer: wiassaf, mathoma, randolphwest
7
-
ms.date: 10/22/2023
7
+
ms.date: 11/06/2023
8
8
ms.service: sql-database
9
9
ms.subservice: performance
10
10
ms.topic: reference
@@ -59,6 +59,10 @@ Azure SQL Database supports the following targets:
59
59
-[ring_buffer](/sql/relational-databases/extended-events/targets-for-extended-events-in-sql-server#ring_buffer-target) target. Holds event data in memory until replaced by new event data.
60
60
-[event_counter](/sql/relational-databases/extended-events/targets-for-extended-events-in-sql-server#event_counter-target) target. Counts all events that occur during an extended events session.
61
61
-[histogram](/sql/relational-databases/extended-events/targets-for-extended-events-in-sql-server#histogram-target) target. Counts the occurrences of different values of fields or actions in separate buckets.
62
+
-[event_stream](/sql/relational-databases/extended-events/targets-for-extended-events-in-sql-server#event_stream-target). Streams event data to a .Net application.
63
+
64
+
> [!NOTE]
65
+
> The `event_stream` target in Azure SQL Database is in preview.
> -[Configure a virtual network with private endpoints](/azure/private-link/tutorial-private-endpoint-sql-portal).
19
19
20
-
1) The server must also have Azure AD authentication enabled with an Azure Active Directory admin account assigned. For local development connections, the Azure Active Directory admin account should be an account you can also log into Visual Studio or the Azure CLI with locally. You can verify whether your server has Azure AD authentication enabled on the **Azure Active Directory** page.
20
+
1) The server must also have Microsoft Entra authentication enabled and have a Microsoft Entra admin account assigned. For local development connections, the Microsoft Entra admin account should be an account you can also log into Visual Studio or the Azure CLI with locally. You can verify whether your server has Microsoft Entra authentication enabled on the **Microsoft Entra ID** page of your logical server.
21
21
22
-
:::image type="content" source="../database/media/passwordless-connections/enable-active-directory-small.png" lightbox="../database/media/passwordless-connections/enable-active-directory.png" alt-text="A screenshot showing how to enable Active Directory authentication.":::
22
+
:::image type="content" source="../database/media/passwordless-connections/enable-active-directory-small.png" lightbox="../database/media/passwordless-connections/enable-active-directory.png" alt-text="A screenshot showing how to enable Microsoft Entra authentication.":::
23
23
24
-
1) If you're using a personal Azure account, make sure you have [Azure Active Directory setup and configured for Azure SQL Database](../database/authentication-aad-configure.md) in order to assign your account as a server admin. If you're using a corporate account, Azure Active Directory will most likely already be configured for you.
24
+
1) If you're using a personal Azure account, make sure you have [Microsoft Entra setup and configured for Azure SQL Database](../database/authentication-aad-configure.md) in order to assign your account as a server admin. If you're using a corporate account, Microsoft Entra ID will most likely already be configured for you.
Copy file name to clipboardExpand all lines: azure-sql/includes/passwordless/configure-the-azure-sql-database.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -7,19 +7,19 @@ ms.topic: include
7
7
ms.custom: generated
8
8
---
9
9
10
-
Passwordless connections use Azure Active Directory (Azure AD) authentication to connect to Azure services, including Azure SQL Database. With Azure AD authentication, you can manage identities in a central location to simplify permission management. Learn more about configuring Azure AD authentication for your Azure SQL Database:
10
+
Passwordless connections use Microsoft Entra authentication to connect to Azure services, including Azure SQL Database. Microsoft Entra authentication, you can manage identities in a central location to simplify permission management. Learn more about configuring Microsoft Entra authentication for your Azure SQL Database:
11
11
12
-
-[Azure AD authentication overview](/azure/azure-sql/database/authentication-aad-overview)
13
-
-[Configure Azure AD auth](/azure/azure-sql/database/authentication-aad-configure)
-[Configure Microsoft Entra auth](/azure/azure-sql/database/authentication-aad-configure)
14
14
15
-
For this migration guide, ensure you have an Azure AD admin assigned to your Azure SQL Database.
15
+
For this migration guide, ensure you have a Microsoft Entra admin assigned to your Azure SQL Database.
16
16
17
-
1) Navigate to the **Azure Active Directory** page of your logical server.
17
+
1) Navigate to the **Microsoft Entra** page of your logical server.
18
18
19
-
1) Select **Set admin**.
19
+
1) Select **Set admin** to open the **Microsoft Entra ID** flyout menu.
20
20
21
-
1) In the **Azure Active Directory** flyout menu, search for the user you want to assign as admin.
21
+
1) In the **Microsoft Entra ID** flyout menu, search for the user you want to assign as admin.
22
22
23
23
1) Select the user and choose **Select**.
24
24
25
-
:::image type="content" source="../../database/media/passwordless-connections/migration-enable-active-directory-small.png" lightbox="../../database/media/passwordless-connections/migration-enable-active-directory.png" alt-text="A screenshot showing how to enable active directory admin.":::
25
+
:::image type="content" source="../../database/media/passwordless-connections/migration-enable-active-directory-small.png" lightbox="../../database/media/passwordless-connections/migration-enable-active-directory.png" alt-text="A screenshot showing how to enable Microsoft Entra admin.":::
title: Connect to SQL using Azure Active Directory (Azure AD) with SSMS 18.6 and later
3
-
description: Message to explain starting December 2021, you can only use Azure Active Directory (Azure AD) with SSMS 18.6 and later
2
+
title: Connect to SQL using Microsoft Entra with SSMS 18.6 and later
3
+
description: Message to explain starting December 2021, you can only use Microsoft Entra with SSMS 18.6 and later
4
4
author: markingmyname
5
5
ms.author: maghan
6
6
ms.reviewer: drskwier
7
7
ms.topic: include
8
8
---
9
9
10
10
> [!NOTE]
11
-
> In December 2021, releases of SSMS prior to 18.6 will no longer authenticate through Azure Active Directory with MFA.
11
+
> In December 2021, releases of SSMS prior to 18.6 will no longer authenticate through Microsoft Entra ID with MFA.
12
12
>
13
-
> To continue utilizing Azure Active Directory authentication with MFA, you need [SSMS 18.6 or later](/sql/ssms/download-sql-server-management-studio-ssms).
13
+
> To continue utilizing Microsoft Entra authentication with MFA, you need [SSMS 18.6 or later](/sql/ssms/download-sql-server-management-studio-ssms).
Copy file name to clipboardExpand all lines: azure-sql/includes/virtual-machines-best-practices-security.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ SQL Server features and capabilities provide a method of security at the data le
11
11
- Use [Microsoft Defender for SQL](/azure/defender-for-cloud/defender-for-sql-introduction) to discover and mitigate potential database vulnerabilities, as well as detect anomalous activities that could indicate a threat to your SQL Server instance and database layer.
12
12
-[Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is a part of [Microsoft Defender for SQL](/azure/defender-for-cloud/defender-for-sql-introduction) that can discover and help remediate potential risks to your SQL Server environment. It provides visibility into your security state, and includes actionable steps to resolve security issues.
13
13
- Use [Azure confidential VMs](../virtual-machines/windows/security-considerations-best-practices.md#confidential-vms) to reinforce protection of your data in-use, and data-at-rest against host operator access. Azure confidential VMs allow you to confidently store your sensitive data in the cloud and meet strict compliance requirements.
14
-
- If you're on SQL Server 2022, consider using [Azure Active Directory authentication](../virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm.md) to connect to your instance of SQL Server.
14
+
- If you're on SQL Server 2022, consider using [Microsoft Entra authentication](../virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm.md) to connect to your instance of SQL Server.
15
15
-[Azure Advisor](/azure/advisor/advisor-security-recommendations) analyzes your resource configuration and usage telemetry and then recommends solutions that can help you improve the cost effectiveness, performance, high availability, and security of your Azure resources. Leverage Azure Advisor at the virtual machine, resource group, or subscription level to help identify and apply best practices to optimize your Azure deployments.
16
16
- Use [Azure Disk Encryption](/azure/virtual-machines/windows/disk-encryption-windows) when your compliance and security needs require you to encrypt the data end-to-end using your encryption keys, including encryption of the ephemeral (locally attached temporary) disk.
17
17
-[Managed Disks are encrypted](/azure/virtual-machines/disk-encryption) at rest by default using Azure Storage Service Encryption, where the encryption keys are Microsoft-managed keys stored in Azure.
Copy file name to clipboardExpand all lines: azure-sql/includes/virtual-machines-sql-server-akv-prepare.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ tags: azure-service-management
14
14
To use Azure Key Vault Integration to configure your SQL Server VM, there are several prerequisites:
15
15
16
16
1.[Install Azure PowerShell](#install)
17
-
2.[Create an Azure Active Directory](#register)
17
+
2.[Create a Microsoft Entra tenant](#register)
18
18
3.[Create a key vault](#createkeyvault)
19
19
20
20
The following sections describe these prerequisites and the information you need to collect to later run the PowerShell cmdlets.
@@ -24,13 +24,13 @@ The following sections describe these prerequisites and the information you need
24
24
### <aid="install"></a> Install Azure PowerShell
25
25
Make sure you have installed the latest Azure PowerShell module. For more information, see [How to install and configure Azure PowerShell](/powershell/azure/install-az-ps).
26
26
27
-
### <aid="register"></a> Register an application in your Azure Active Directory
27
+
### <aid="register"></a> Register an application in your Microsoft Entra ID
28
28
29
-
First, you need to have an [Azure Active Directory](https://azure.microsoft.com/trial/get-started-active-directory/)(AAD) in your subscription. Among many benefits, this allows you to grant permission to your key vault for certain users and applications.
29
+
First, you need to have an [Microsoft Entra](https://azure.microsoft.com/trial/get-started-active-directory/)tenant in your subscription. Among many benefits, this allows you to grant permission to your key vault for certain users and applications.
30
30
31
-
Next, register an application with AAD. This will give you a Service Principal account that has access to your key vault, which your VM will need. In the Azure Key Vault article, you can find these steps in the [Register an application with Azure Active Directory](/azure/key-vault/general/manage-with-cli2#registering-an-application-with-azure-active-directory) section, or you can see the steps with screenshots in the **Get an identity for the application section** of [this blog post](/archive/blogs/kv/azure-key-vault-step-by-step). Before completing these steps, you need to collect the following information during this registration that is needed later when you enable Azure Key Vault Integration on your SQL VM.
31
+
Next, register an application with Microsoft Entra ID. This gives you a Service Principal account that has access to your key vault, which your VM needs. In the Azure Key Vault article, you can find these steps in the [Register an application with Microsoft Entra ID](/azure/key-vault/general/manage-with-cli2#registering-an-application-with-azure-active-directory) section, or you can see the steps with screenshots in the **Get an identity for the application section** of [this blog post](/archive/blogs/kv/azure-key-vault-step-by-step). Before completing these steps, you need to collect the following information during this registration that is needed later when you enable Azure Key Vault Integration on your SQL VM.
32
32
33
-
* After the application is added, find the **Application ID** (also known as AAD ClientID or AppID) on the **Registered app** blade.
33
+
* After the application is added, find the **Application ID** (also known as ClientID or AppID) on the **Registered app** blade.
34
34
The application ID is assigned later to the **$spName** (Service Principal name) parameter in the PowerShell script to enable Azure Key Vault Integration.
@@ -44,14 +44,14 @@ Next, register an application with AAD. This will give you a Service Principal a
44
44
* You must authorize this new application ID (or client ID) to have the following access permissions: **get**, **wrapKey**, **unwrapKey**. This is done with the [Set-AzKeyVaultAccessPolicy](/powershell/module/az.keyvault/set-azkeyvaultaccesspolicy) cmdlet. For more information, see [Azure Key Vault overview](/azure/key-vault/general/overview).
45
45
46
46
### <aid="createkeyvault"></a> Create a key vault
47
-
In order to use Azure Key Vault to store the keys you will use for encryption in your VM, you need access to a key vault. If you have not already set up your key vault, create one by following the steps in the [Getting Started with Azure Key Vault](/azure/key-vault/general/overview) article. Before completing these steps, there is some information you need to collect during this set up that is needed later when you enable Azure Key Vault Integration on your SQL VM.
47
+
In order to use Azure Key Vault to store the keys you'll use for encryption in your VM, you need access to a key vault. If you have not already set up your key vault, create one by following the steps in the [Getting Started with Azure Key Vault](/azure/key-vault/general/overview) article. Before completing these steps, there's some information you need to collect during this set up that is needed later when you enable Azure Key Vault Integration on your SQL VM.
When you get to the Create a key vault step, note the returned **vaultUri** property, which is the key vault URL. In the example provided in that step, shown below, the key vault name is ContosoKeyVault, therefore the key vault URL would be `https://contosokeyvault.vault.azure.net/`.
53
+
When you get to the Create a key vault step, note the returned **vaultUri** property, which is the key vault URL. In the example provided in that step, shown later, the key vault name is ContosoKeyVault, therefore the key vault URL would be `https://contosokeyvault.vault.azure.net/`.
54
54
55
55
The key vault URL is assigned later to the **$akvURL** parameter in the PowerShell script to enable Azure Key Vault Integration.
56
56
57
-
After the key vault is created, we need to add a key to the key vault, this key will be referred when we create an asymmetric key create in SQL Server later.
57
+
After the key vault is created, we need to add a key to the key vault, this key will be referred when we create an asymmetric key create in SQL Server later.
0 commit comments