SQLServerCentral Editorial

Removing SA from Azure SQL Database

,

Due to a email sending issue, this editorial from last week is being resent in the newsletter.

One of the recommendations from Microsoft SQL Server is to use Windows authentication. This has been in the docs for years, and I've heard many MS consultants and employees note this. Many customers and clients have tried to use Windows Authentication only, but often in a cross platform environment with Java or Linux clients, one usually has needed SQL authentication with a user and password. Client libraries have been enhanced so this isn't necessary, but still some people prefer SQL authentication, especially with clients outside their organization. It's simple, easy, and developers can make it work in seconds.

With Azure SQL Databases, some companies defaulted to a username and password, as their Active Directory (AD) wasn't extended to Azure. That has become easier to do, and many people are taking advantage of it. In fact, some customers are so integrated, they want to do away with usernames and passwords in Azure.

Microsoft has listened, and is giving them the option. The feature is in preview, but if you enable this, SQL auth is turned off, which means whatever administrative account you set up for the server with a name and password will not work. That's essentially the "sa" account, though with your own custom name.

While this feature won't be useful for everyone, it's a good option to have. As more companies look to tighten security and limit the attack surface area, being able to make this choice is important. It's also something that architects and administrators should be aware of and consider in their decisions on how to implement applications in Azure.

Rate

5 (1)

You rated this post out of 5. Change rating

Share

Share

Rate

5 (1)

You rated this post out of 5. Change rating