Skip to content

Latest commit

 

History

History
70 lines (55 loc) · 6.94 KB

sql-database-ssms-mfa-authentication-configure.md

File metadata and controls

70 lines (55 loc) · 6.94 KB
title description services ms.service ms.subservice ms.custom ms.devlang ms.topic author ms.author ms.reviewer manager ms.date
Configure multi-factor authentication - Azure SQL | Microsoft Docs
Learn how to use Multi-Factored Authentication with SSMS for SQL Database and SQL Data Warehouse.
sql-database
sql-database
security
conceptual
GithubMirek
mireks
vanto
craigg
06/13/2018

Configure multi-factor authentication for SQL Server Management Studio and Azure AD

This topic shows you how to use Azure Active Directory multi-factor authentication (MFA) with SQL Server Management Studio. Azure AD MFA can be used when connecting SSMS or SqlPackage.exe to Azure SQL Database and SQL Data Warehouse. For an overview of Azure SQL Database multi-factor authentication, see Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA).

Note

This topic applies to Azure SQL server, and to both SQL Database and SQL Data Warehouse databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and SQL Data Warehouse.

Configuration steps

  1. Configure an Azure Active Directory - For more information, see Administering your Azure AD directory, Integrating your on-premises identities with Azure Active Directory, Add your own domain name to Azure AD, Microsoft Azure now supports federation with Windows Server Active Directory, and Manage Azure AD using Windows PowerShell.
  2. Configure MFA - For step-by-step instructions, see What is Azure Multi-Factor Authentication?, Conditional Access (MFA) with Azure SQL Database and Data Warehouse. (Full conditional access requires a Premium Azure Active Directory (Azure AD). Limited MFA is available with a standard Azure AD.)
  3. Configure SQL Database or SQL Data Warehouse for Azure AD Authentication - For step-by-step instructions, see Connecting to SQL Database or SQL Data Warehouse By Using Azure Active Directory Authentication.
  4. Download SSMS - On the client computer, download the latest SSMS, from Download SQL Server Management Studio (SSMS). For all the features in this topic, use at least July 2017, version 17.2.

Connecting by using universal authentication with SSMS

The following steps show how to connect to SQL Database or SQL Data Warehouse by using the latest SSMS.

  1. To connect using Universal Authentication, on the Connect to Server dialog box, select Active Directory - Universal with MFA support. (If you see Active Directory Universal Authentication you are not on the latest version of SSMS.)
    1mfa-universal-connect

  2. Complete the User name box with the Azure Active Directory credentials, in the format [email protected].
    1mfa-universal-connect-user

  3. If you are connecting as a guest user, you must click Options, and on the Connection Property dialog box, complete the AD domain name or tenant ID box. For more information, see Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA). mfa-tenant-ssms

  4. As usual for SQL Database and SQL Data Warehouse, you must click Options and specify the database on the Options dialog box. (If the connected user is a guest user ( i.e. [email protected]), you must check the box and add the current AD domain name or tenant ID as part of Options. See Universal Authentication with SQL Database and SQL Data Warehouse (SSMS support for MFA). Then click Connect.

  5. When the Sign in to your account dialog box appears, provide the account and password of your Azure Active Directory identity. No password is required if a user is part of a domain federated with Azure AD.
    2mfa-sign-in

    [!NOTE] For Universal Authentication with an account that does not require MFA, you connect at this point. For users requiring MFA, continue with the following steps:

  6. Two MFA setup dialog boxes might appear. This one time operation depends on the MFA administrator setting, and therefore may be optional. For an MFA enabled domain this step is sometimes pre-defined (for example, the domain requires users to use a smartcard and pin).
    3mfa-setup

  7. The second possible one time dialog box allows you to select the details of your authentication method. The possible options are configured by your administrator.
    4mfa-verify-1

  8. The Azure Active Directory sends the confirming information to you. When you receive the verification code, enter it into the Enter verification code box, and click Sign in.
    5mfa-verify-2

When verification is complete, SSMS connects normally presuming valid credentials and firewall access.

Next steps