π Azure SQL Server Microsoft Entra authentication is not configured π’
- Contextual name: π Server Microsoft Entra authentication is not configured π’
- ID:
/ce/ca/azure/sql-database/server-microsoft-entra-authentication
- Located in: π Azure SQL Database
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-2fcb6d85
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-2fcb6d85 | 2 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Use Microsoft Entra authentication for authentication with SQL Database to manage credentials in a single place.
Rationaleβ
Microsoft Entra authentication is a mechanism to connect to Microsoft Azure SQL Database and SQL Data Warehouse by using identities in the Microsoft Entra ID directory. With Entra ID authentication, identities of database users and other Microsoft services can be managed in one central location. Central ID management provides a single place to manage database users and simplifies permission management.
- It provides an alternative to SQL Server authentication.
- Helps stop the proliferation of user identities across database servers.
- Allows password rotation in a single place.
- Customers can manage database permissions using external (Entra ID) groups.
- It can eliminate storing passwords by enabling integrated Windows authentication and other forms of authentication supported by Microsoft Entra.
- Entra ID authentication uses contained database users to authenticate identities at the database level.
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- Go to
SQL servers
.- For each SQL server, under Settings, click
Microsoft Entra admin
.- Click on
Set admin
.- Select an admin.
- Click
Select
.- Click
Save
.From Azure CLIβ
az ad user show --id
For each Server, set AD Admin:
az sql server ad-admin create --resource-group <resource group name> --server <server name> --display-name <display name> --object-id <object id of user>
From PowerShellβ
For each Server, set Entra ID Admin:
Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName <resource group name> -ServerName <server name> -DisplayName "<Display name of AD account to set as DB administrator>"