title | description | keywords | services | documentationcenter | author | manager | editor | ms.assetid | ms.service | ms.custom | ms.workload | ms.tgt_pltfrm | ms.devlang | ms.topic | ms.date | ms.author |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AAD auth: Azure SQL Database firewalls, authentication, access | Microsoft Docs |
In this getting-started tutorial, you learn how to use SQL Server Management Studio and Transact-SQL to work with server-level and database-level firewall rules, Azure Active Directory authentication, logins, users, and roles to grant access and control to Azure SQL Database servers and databases. |
sql-database |
CarlRabeler |
jhubbard |
67797b09-f5c3-4ec2-8494-fe18883edf7f |
sql-database |
authentication and authorization |
data-management |
na |
na |
hero-article |
01/17/2017 |
carlrab |
In this getting-started tutorial, you learn how to use SQL Server Management Studio to work with Azure Active Directory authentication, logins, users, and database roles that grant access and permissions to Azure SQL Database servers and databases. You learn to:
- View user permissions in the master database and in user databases
- Create logins and users based on Azure Active Directory authentication
- Grant server-wide and database-specific permissions to users
- Log in to a user database as a non-admin user
- Create database-level firewall rules for database users
- Create server-level firewall rules for server admins
Time estimate: This tutorial takes approximately 45 minutes to complete (assuming you have already met the prerequisites).
-
You need an Azure account. You can open a free Azure account or Activate Visual Studio subscriber benefits.
-
You must be able to connect to the Azure portal using an account that is a member of either the subscription owner or contributor role. For more information on role-based access control (RBAC), see Getting started with access management in the Azure portal.
-
You have completed the Get started with Azure SQL Database servers, databases, and firewall rules by using the Azure portal and SQL Server Management Studio or the equivalent PowerShell version of this tutorial. If not, either complete this prerequisite tutorial or execute the PowerShell script at the end of the PowerShell version of this tutorial before continuing.
[!NOTE] The completion of the related tutorial for SQL Server authtentication, SQL Database tutorial: SQL authentication, logins and user accounts, database roles, permissions, server-level firewall rules, and database-level firewall rules, is optional - however, there are concepts covered in that tutorial that are not repeated here. The prcoedures in this tutorial related to server and database level firewalls are not required if you completed this related tutorial on the same computers (with the same IP addresses) and are marked as optional for that reason. Also, the screenshots in this tutorial assume that you have completed of this related tutorial.
-
You have created and populated an Azure Active Directory. For more information, see For more information, see Integrating your on-premises identities with Azure Active Directory, Add your own domain name to Azure AD, Microsoft Azure now supports federation with Windows Server Active Directory, Administering your Azure AD directory, Manage Azure AD using Windows PowerShell, and Hybrid Identity Required Ports and Protocols.
Note
This tutorial helps you to learn the content of these learn topics: SQL Database access and control, Logins, users, and database roles, Principals, Database roles, SQL Database firewall rules, and Azure Active Directory authentication.
Using your existing subscription, follow these steps to connect to the Azure portal.
-
Open your browser of choice and connect to the Azure portal.
-
Sign in to the Azure portal.
-
On the Sign in page, provide the credentials for your subscription.
In this section of the tutorial, you view information about the security configuration for your logical server in the Azure portal.
-
Open the SQL Server blade for your logical server and view the information in the Overview page. Notice that an Azure Active Directory admin has not been configured.
-
Click Not configured in the Essentials pane to open the Active Directory admin blade.
-
Click Set admin to open the Add admin blade and then select an Active Directory user or group account as the Active Directory admin for your server.
-
Click Select and then click Save.
Note
To review connection information for this server, go to View or update server settings. For this tutorial series, the fully qualified server name is 'sqldbtutorialserver.database.windows.net'.
-
If you have not already done so, download and install the latest version of SSMS at Download SQL Server Management Studio. To stay up-to-date, the latest version of SSMS prompts you when there is a new version available to download.
-
After installing, type Microsoft SQL Server Management Studio in the Windows search box and click Enter to open SSMS.
-
In the Connect to Server dialog box, select one of the Active Directory authentication methods and then provide the appropriate authentication information. For information on choosing a method, see Azure Active Directory authentication and SSMS support for Azure AD MFA.
-
Enter the necessary information to connect to your SQL server using SQL Server Authentication and the Server admin account.
-
Click Connect.
In this section of the tutorial, you view information about the server admin account and its permissions in the master database and in user databases.
-
In Object Explorer, expand Databases, expand System databases, expand master, expand Security, and then expand Users. Notice that a user account has been created in the master database for the Active Directory admin. Notice also that a login was not created for Active Directory admin user account.
[!NOTE] For information about the other user accounts that appear, see Principals.
-
In Object Explorer, right-click master and then click New Query to open a query window connected to the master database.
-
In the query window, execute the following query to return information about the user executing the query. Notice that [email protected] is returned for the user account executing this query (we see a different result when we query a user database later in this procedure).
SELECT USER;
-
In the query window, execute the following query to return information about the permissions of the Active Directory admin user. Notice that the Active Directory admin user has permissions to connect to the master database, create logins and users, select information from the sys.sql_logins table, and add users to the dbmanager and dbcreator database roles. These permissions are in addition to permissions granted to the public role from which all users inherit permissions (such as permissions to select information from certain tables). See Permissions for more information.
SELECT prm.permission_name , prm.class_desc , prm.state_desc , p2.name as 'Database role' , p3.name as 'Additional database role' FROM sys.database_principals p JOIN sys.database_permissions prm ON p.principal_id = prm.grantee_principal_id LEFT JOIN sys.database_principals p2 ON prm.major_id = p2.principal_id LEFT JOIN sys.database_role_members r ON p.principal_id = r.member_principal_id LEFT JOIN sys.database_principals p3 ON r.role_principal_id = p3.principal_id WHERE p.name = '[email protected]';
-
In Object Explorer, expand blankdb, expand Security, and then expand Users. Notice that there is no user account called [email protected] in this database.
-
In Object Explorer, right-click blankdb and then click New Query.
-
In the query window, execute the following query to return information about the user executing the query. Notice that dbo is returned for the user account executing this query (by default, the Server admin login is mapped to the dbo user account in each user database).
SELECT USER;
-
In the query window, execute the following query to return information about the permissions of the dbo user. Notice that dbo is a member of the public role and also a member of the db_owner fixed database role. See Database-Level Roles for more information.
SELECT prm.permission_name , prm.class_desc , prm.state_desc , p2.name as 'Database role' , p3.name as 'Additional database role' FROM sys.database_principals AS p JOIN sys.database_permissions AS prm ON p.principal_id = prm.grantee_principal_id LEFT JOIN sys.database_principals AS p2 ON prm.major_id = p2.principal_id LEFT JOIN sys.database_role_members r ON p.principal_id = r.member_principal_id LEFT JOIN sys.database_principals AS p3 ON r.role_principal_id = p3.principal_id WHERE p.name = 'dbo';
-
Optionally, repeat the previous three steps for the AdventureWorksLT user database.
In this section of the tutorial, you create a user account in the AdventureWorksLT database based on a user's principal name of an Azure AD user or display name for an Azure AD group, test this user's permissions as member of the public role, grant this user SELECT permissions, and then test this user's permissions again.
Note
Database-level users (contained users) increase the portability of your database, a capability that we explore in later tutorials.
-
In Object Explorer, right-click AdventureWorksLT and then click New Query to open a query window connected to the AdventureWorksLT database.
-
Execute the following statement to create a user account in the AdventureWorksLT database for a user in the Microsoft domain called aaduser1.
CREATE USER [[email protected]] FROM EXTERNAL PROVIDER;
-
In the query window, execute the following query to return information about the permissions of user1. Notice that the only permissions that user1 has are the permissions inherited from the public role.
SELECT prm.permission_name , prm.class_desc , prm.state_desc , p2.name as 'Database role' , p3.name as 'Additional database role' FROM sys.database_principals AS p JOIN sys.database_permissions AS prm ON p.principal_id = prm.grantee_principal_id LEFT JOIN sys.database_principals AS p2 ON prm.major_id = p2.principal_id LEFT JOIN sys.database_role_members r ON p.principal_id = r.member_principal_id LEFT JOIN sys.database_principals AS p3 ON r.role_principal_id = p3.principal_id WHERE p.name = '[email protected]';
-
Execute the following queries to attempt to query a table in the AdventureWorksLT database as user1.
EXECUTE AS USER = '[email protected]'; SELECT * FROM [SalesLT].[ProductCategory]; REVERT;
-
Execute the following statement to grant SELECT permissions on the ProductCategory table in the SalesLT schema to user1.
GRANT SELECT ON OBJECT::[SalesLT].[ProductCategory] to [[email protected]];
-
Execute the following queries to attempt to query a table in the AdventureWorksLT database as user1.
EXECUTE AS USER = '[email protected]'; SELECT * FROM [SalesLT].[ProductCategory]; REVERT;
Note
You do not need to complete this procedure if you completed the equivalent procedure in the related tutorial for SQL Server authtentication, SQL Database tutorial: SQL authentication, logins and user accounts, database roles, permissions, server-level firewall rules, and database-level firewall rules and are learning using the same computer with the same IP address.
In this section of the tutorial, you attempt to log in using the new user account from a computer with a different IP address, create a database-level firewall rule as the Server admin, and then successfully log in using this new database-level firewall rule.
Note
Database-level firewall rules increase the portability of your database, a capability that we explore in later tutorials.
-
On another computer for which you have not already created a server-level firewall rule, open SQL Server Management Studio.
[!IMPORTANT] Always use the latest version of SSMS at Download SQL Server Management Studio.
-
In the Connect to Server window, enter the server name and authentication information to connect using SQL Server authentication with the [email protected] account.
-
Click Options to specify the database to which you want to connect and then type AdventureWorksLT in the Connect to Database drop-down box on the Connection Properties tab.
-
Click Connect. A dialog box appears informing you that the computer from which you are attempting to connect to SQL Database does not have a firewall rule enabling access to the database. The dialog box that you receive has two variations depending upon steps you have previously taken with firewalls, but you usually get the first dialog box shown.
[!NOTE] The newest versions of SSMS include the functionality to allow subscription owners and contributors to sign in to Microsoft Azure and create a server-level firewall rule.
-
Copy the client IP address from this dialog box for use in step 7.
-
Click Cancel but do not close the Connect to Server dialog box.
-
Switch back to a computer for which you have already created a server-level firewall rule and connect to your server using the Server admin account.
-
In a new query window connected to the AdventureWorksLT database as Server admin, execute the following statement to create a database-level firewall by executing sp_set_database_firewall_rule using the IP address from step 4:
EXEC sp_set_database_firewall_rule @name = N'AdventureWorksLTFirewallRule', @start_ip_address = 'x.x.x.x', @end_ip_address = 'x.x.x.x';
-
Switch computers again and click Connect in the Connect to Server dialog box to connect to AdventureWorksLT as aaduser1.
-
In Object Explorer, expand Databases, expand AdventureWorksLT, and then expand Tables. Notice that user1 only has permission to view a single table, the SalesLT.ProductCategory table.
-
In Object Explorer, right-click SalesLT.ProductCategory and click Select Top 1000 Rows.
- For an overview of access and control in SQL Database, see SQL Database access and control.
- For an overview of logins, users, and database roles in SQL Database, see Logins, users, and database roles.
- For more information about database principals, see Principals.
- For more information about database roles, see Database roles.
- For more information about firewall rules in SQL Database, see SQL Database firewall rules.