Skip to main content

๐Ÿ›ก๏ธ Azure SQL Server Microsoft Entra authentication is not configured๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Server Microsoft Entra authentication is not configured๐ŸŸข
  • ID: /ce/ca/azure/sql-database/server-microsoft-entra-authentication
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Similar Internal Rulesโ€‹

RulePoliciesFlags
โœ‰๏ธ dec-x-2fcb6d852

Descriptionโ€‹

Open File

Descriptionโ€‹

Use Microsoft Entra authentication for authentication with SQL Database to manage credentials in a single place.

Rationaleโ€‹

Microsoft Entra authentication is a mechanism to connect to Microsoft Azure SQL Database and SQL Data Warehouse by using identities in the Microsoft Entra ID directory. With Entra ID authentication, identities of database users and other Microsoft services can be managed in one central location. Central ID management provides a single place to manage database users and simplifies permission management.

  • It provides an alternative to SQL Server authentication.
  • Helps stop the proliferation of user identities across database servers.
  • Allows password rotation in a single place.
  • Customers can manage database permissions using external (Entra ID) groups.
  • It can eliminate storing passwords by enabling integrated Windows authentication and other forms of authentication supported by Microsoft Entra.
  • Entra ID authentication uses contained database users to authenticate identities at the database level.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Azure Portalโ€‹

  1. Go to SQL servers.
  2. For each SQL server, under Settings, click Microsoft Entra admin.
  3. Click on Set admin.
  4. Select an admin.
  5. Click Select.
  6. Click Save.

From Azure CLIโ€‹

az ad user show --id

For each Server, set AD Admin:

az sql server ad-admin create --resource-group <resource group name> --server <server name> --display-name <display name> --object-id <object id of user>

From PowerShellโ€‹

For each Server, set Entra ID Admin:

Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName <resource group name> -ServerName <server name> -DisplayName "<Display name of AD account to set as DB administrator>"

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ CIS Azure v1.1.0 โ†’ ๐Ÿ’ผ 4.8 Ensure that Azure Active Directory Admin is configured11no data
๐Ÿ’ผ CIS Azure v1.3.0 โ†’ ๐Ÿ’ผ 4.4 Ensure that Azure Active Directory Admin is configured - Level 1 (Automated)11no data
๐Ÿ’ผ CIS Azure v1.4.0 โ†’ ๐Ÿ’ผ 4.5 Ensure that Azure Active Directory Admin is configured - Level 1 (Automated)11no data
๐Ÿ’ผ CIS Azure v1.5.0 โ†’ ๐Ÿ’ผ 4.1.4 Ensure that Azure Active Directory Admin is Configured for SQL Servers - Level 1 (Automated)11no data
๐Ÿ’ผ CIS Azure v2.0.0 โ†’ ๐Ÿ’ผ 4.1.4 Ensure that Azure Active Directory Admin is Configured for SQL Servers - Level 1 (Automated)11no data
๐Ÿ’ผ CIS Azure v2.1.0 โ†’ ๐Ÿ’ผ 4.1.4 Ensure that Microsoft Entra authentication is Configured for SQL Servers - Level 1 (Automated)11no data
๐Ÿ’ผ CIS Azure v3.0.0 โ†’ ๐Ÿ’ผ 5.1.4 Ensure that Microsoft Entra authentication is Configured for SQL Servers (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Secure Access57no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-2(1) Automated System Account Management (M)(H)18no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-3 Access Enforcement (L)(M)(H)3768no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ AC-3 Access Enforcement (L)(M)(H)68no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ AC-2(1) Automated System Account Management (M)(H)18no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ AC-3 Access Enforcement (L)(M)(H)68no data
๐Ÿ’ผ ISO/IEC 27001:2022 โ†’ ๐Ÿ’ผ 5.15 Access control1431no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-2(1) Account Management _ Automated System Account Management418no data
๐Ÿ’ผ SOC 2 โ†’ ๐Ÿ’ผ CC7.1-1 Uses Defined Configuration Standards45no data
๐Ÿ’ผ UK Cyber Essentials โ†’ ๐Ÿ’ผ 1.2 Prevent access to the administrative interface from the internet3638no data
๐Ÿ’ผ UK Cyber Essentials โ†’ ๐Ÿ’ผ 2.1.2 Change any default or guessable account passwords23no data
๐Ÿ’ผ UK Cyber Essentials โ†’ ๐Ÿ’ผ 4.2.2 Use technical controls to manage the quality of passwords.23no data
๐Ÿ’ผ UK Cyber Essentials โ†’ ๐Ÿ’ผ 4.2.4 The password element of the multi-factor authentication23no data