Skip to content

Latest commit

 

History

History
84 lines (60 loc) · 2.58 KB

Azure.SQLMI.ManagedIdentity.md

File metadata and controls

84 lines (60 loc) · 2.58 KB
severity pillar category resource online version
Important
Security
Authentication
SQL Managed Instance

Managed identity

SYNOPSIS

Ensure managed identity is used to allow support for Azure AD authentication.

DESCRIPTION

A managed identity is required for allowing support for Azure AD authentication in SQL Managed Instance.

You must enable the instance identity (SMI or UMI) to allow support for Azure AD authentication in SQL Managed Instance.

Additionally, a managed identity is required for transparent data encryption with customer-managed key.

RECOMMENDATION

Consider configure a managed identity to allow support for Azure AD authentication.

EXAMPLES

Configure with Azure template

To deploy SQL Managed Instances that pass this rule:

  • Set identity.type to SystemAssigned or UserAssigned or SystemAssigned,UserAssigned.
  • If identity.type is UserAssigned or SystemAssigned,UserAssigned, reference the identity with identity.userAssignedIdentities.

For example:

{
  "type": "Microsoft.Sql/managedInstances",
  "apiVersion": "2022-05-01-preview",
    "name": "[parameters('managedInstanceName')]",
  "location": "[parameters('location')]",
  "identity": {
    "type": "SystemAssigned",
    "userAssignedIdentities": {}
  },
  "properties": {}
}

Configure with Bicep

To deploy SQL Managed Instances that pass this rule:

  • Set identity.type to SystemAssigned or UserAssigned or SystemAssigned,UserAssigned.
  • If identity.type is UserAssigned or SystemAssigned,UserAssigned, reference the identity with identity.userAssignedIdentities.

For example:

resource managedInstance 'Microsoft.Sql/managedInstances@2022-05-01-preview' = {
  name: appName
  location: location
  name: managedInstanceName
  location: location
  identity: {
    type: 'SystemAssigned'
    userAssignedIdentities: {}
  }
  properties: {}
}

NOTES

To grant permissions to access Microsoft Graph through an SMI or a UMI, you need to use PowerShell. You can't grant these permissions by using the Azure portal.

LINKS