Unable to authenticate with Azure AD credentails in Azure SQL Database using private endpoint/links

arunjohnv 1 Reputation point
2021-05-25T05:55:09.197+00:00

I have a SQL database that is being used to store data pushed from D365 and needs to be accessed from AWS.

The requirement is as follows:
a. The access to the Azure SQL database should be using the internal network using private endpoints/links.
b. The user/identity should authenticate using Azure AD credentials and not using the (native) SQL user.

I tried this from my end but it results as follows:

  1. AD user authentication does not work if the SQL database url points to a Private IP address.
  2. AD user authentication works only if the SQL database url points to a Public IP address.

The SQL database has not been added to a VNET enabling service endpoints as this might block the connections from D365 ?

Can anyone explain what is the reason behind the behavior for the above 2 scenarios ?

And is there a way to provide a solution that satisfies both the requirements (a and b) ?

Azure SQL Database
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
19,562 questions
{count} votes