Secure a database in Azure Synapse
This article will walk you through the basics of securing your Synapse SQL pool. In particular, this article gets you started with resources for limiting access, protecting data, and monitoring activities on a database provisioned using SQL pool.
Connection Security refers to how you restrict and secure connections to your database using firewall rules and connection encryption.
Firewall rules are used by both the logical SQL server and its databases to reject connection attempts from IP addresses that haven't been explicitly whitelisted. To allow connections from your application or client machine's public IP address, you must first create a server-level firewall rule using the Azure portal, REST API, or PowerShell.
As a best practice, you should restrict the IP address ranges allowed through your server-level firewall as much as possible. To access SQL pool from your local computer, ensure the firewall on your network and local computer allows outgoing communication on TCP port 1433.
Azure Synapse Analytics uses server-level IP firewall rules. It doesn't support database-level IP firewall rules. For more information, see see Azure SQL Database firewall rules
Connections to your SQL pool are encrypted by default. Modifying connection settings to disable encryption are ignored.
Authentication refers to how you prove your identity when connecting to the database. SQL pool currently supports SQL Server Authentication with a username and password, and with Azure Active Directory.
When you created the server for your database, you specified a "server admin" login with a username and password. Using these credentials, you can authenticate to any database on that server as the database owner, or "dbo" through SQL Server Authentication.
However, as a best practice, your organization's users should use a different account to authenticate. This way you can limit the permissions granted to the application and reduce the risks of malicious activity in case your application code is vulnerable to a SQL injection attack.
To create a SQL Server Authenticated user, connect to the master database on your server with your server admin login and create a new server login. It's a good idea to also create a user in the master database. Creating a user in master allows a user to log in using tools like SSMS without specifying a database name. It also allows them to use the object explorer to view all databases on a server.
-- Connect to master database and create a login CREATE LOGIN ApplicationLogin WITH PASSWORD = 'Str0ng_password'; CREATE USER ApplicationUser FOR LOGIN ApplicationLogin;
Then, connect to your SQL pool database with your server admin login and create a database user based on the server login you created.
-- Connect to the database and create a database user CREATE USER ApplicationUser FOR LOGIN ApplicationLogin;
To give a user permission to perform additional operations such as creating logins or creating new databases, assign the user to the
dbmanager roles in the master database.
For more information on these additional roles and authenticating to a SQL Database, see Managing databases and logins in Azure SQL Database. For more information on connecting using Azure Active Directory, see Connecting by using Azure Active Directory Authentication.
Authorization refers to what you can do within a database once you are authenticated and connected. Authorization privileges are determined by role memberships and permissions. As a best practice, you should grant users the least privileges necessary. To manage roles, you can use the following stored procedures:
EXEC sp_addrolemember 'db_datareader', 'ApplicationUser'; -- allows ApplicationUser to read data EXEC sp_addrolemember 'db_datawriter', 'ApplicationUser'; -- allows ApplicationUser to write data
The server admin account you are connecting with is a member of db_owner, which has authority to do anything within the database. Save this account for deploying schema upgrades and other management operations. Use the "ApplicationUser" account with more limited permissions to connect from your application to the database with the least privileges needed by your application.
There are ways to further limit what a user can do within the database:
- Granular Permissions let you control which operations you can do on individual columns, tables, views, schemas, procedures, and other objects in the database. Use granular permissions to have the most control and grant the minimum permissions necessary.
- Database roles other than db_datareader and db_datawriter can be used to create more powerful application user accounts or less powerful management accounts. The built-in fixed database roles provide an easy way to grant permissions, but can result in granting more permissions than are necessary.
- Stored procedures can be used to limit the actions that can be taken on the database.
The following example grants read access to a user-defined schema.
--CREATE SCHEMA Test GRANT SELECT ON SCHEMA::Test to ApplicationUser
Managing databases and servers from the Azure portal or using the Azure Resource Manager API is controlled by your portal user account's role assignments. For more information, see Role-based access control in Azure portal.
Transparent Data Encryption (TDE) helps protect against the threat of malicious activity by encrypting and decrypting your data at rest. When you encrypt your database, associated backups and transaction log files are encrypted without requiring any changes to your applications. TDE encrypts the storage of an entire database by using a symmetric key called the database encryption key.
In SQL Database, the database encryption key is protected by a built-in server certificate. The built-in server certificate is unique for each server. Microsoft automatically rotates these certificates at least every 90 days. The encryption algorithm used is AES-256. For a general description of TDE, see Transparent Data Encryption.
For details and examples on connecting to your warehouse with different protocols, see Connect to SQL pool.