๐ก๏ธ Azure SQL Server Microsoft Entra authentication is not configured๐ข
- Contextual name: ๐ก๏ธ Server Microsoft Entra authentication is not configured๐ข
- ID: /ce/ca/azure/sql-database/server-microsoft-entra-authentication
- Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
 
- Policy Type: COMPLIANCE_POLICY
- Policy Categories: SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Cloud Conformity: Enable Transparent Data Encryption for SQL Databases
- Internal: dec-x-2fcb6d85
Similar Internal Rulesโ
| Rule | Policies | Flags | 
|---|---|---|
| โ๏ธ dec-x-2fcb6d85 | 2 | 
Descriptionโ
Descriptionโ
Use Microsoft Entra authentication for authentication with SQL Database to manage credentials in a single place.
Rationaleโ
Microsoft Entra authentication is a mechanism to connect to Microsoft Azure SQL Database and SQL Data Warehouse by using identities in the Microsoft Entra ID directory. With Entra ID authentication, identities of database users and other Microsoft services can be managed in one central location. Central ID management provides a single place to manage database users and simplifies permission management.
- It provides an alternative to SQL Server authentication.
- Helps stop the proliferation of user identities across database servers.
- Allows password rotation in a single place.
- Customers can manage database permissions using external (Entra ID) groups.
- It can eliminate storing passwords by enabling integrated Windows authentication and other forms of authentication supported by Microsoft Entra.
- Entra ID authentication uses contained database users to authenticate identities at the database level.
... see more
Remediationโ
Remediationโ
From Azure Portalโ
- Go to
SQL servers.- For each SQL server, under Settings, click
Microsoft Entra admin.- Click on
Set admin.- Select an admin.
- Click
Select.- Click
Save.From Azure CLIโ
az ad user show --idFor each Server, set AD Admin:
az sql server ad-admin create --resource-group <resource group name> --server <server name> --display-name <display name> --object-id <object id of user>From PowerShellโ
For each Server, set Entra ID Admin:
Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName <resource group name> -ServerName <server name> -DisplayName "<Display name of AD account to set as DB administrator>"