You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/serverless-tier-overview.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes the new serverless compute tier and compares
4
4
author: WilliamDAssafMSFT
5
5
ms.author: wiassaf
6
6
ms.reviewer: moslake, mathoma, dfurman, blakhani
7
-
ms.date: 12/12/2025
7
+
ms.date: 12/15/2025
8
8
ms.service: azure-sql-database
9
9
ms.subservice: service-overview
10
10
ms.topic: conceptual
@@ -207,6 +207,10 @@ Auto-resuming is triggered if any of the following conditions are true at any ti
207
207
208
208
Monitoring, management, or other solutions performing any of these operations trigger auto-resuming. Auto-resuming is also triggered during the deployment of some service updates that require the database be online.
209
209
210
+
#### Auto-resume trigger indentification
211
+
212
+
Auto-resume triggers are exposed in the Azure Monitor activity log for **Resume Databases** operations under the `Caller` property in the JSON of the **Succeeded** event.
213
+
210
214
### Connectivity
211
215
212
216
If a serverless database is paused, the first connection attempt resumes the database and returns an error stating that the database is unavailable with error code 40613. Once the database is resumed, retry the connection. Database clients following [connection retry logic recommendations](/azure/architecture/patterns/retry) should not need to be modified. For connection retry logic options and recommendations, see:
Copy file name to clipboardExpand all lines: docs/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-linked-server.md
+21-16Lines changed: 21 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,29 @@
1
1
---
2
-
title: "Linked server for SQL Server with Microsoft Entra authentication"
2
+
title: "Linked Server for SQL Server with Microsoft Entra Authentication"
3
3
description: Learn about how to use linked server for SQL Server with Microsoft Entra authentication
# Linked server for SQL Server with Microsoft Entra authentication
16
17
17
-
[!INCLUDE [SQL Server 2022](../../../includes/applies-to-version/sqlserver2022.md)]
18
+
[!INCLUDE [SQL Server 2022 and later](../../../includes/applies-to-version/sqlserver2022-and-later.md)]
18
19
19
-
[Linked servers](../../linked-servers/linked-servers-database-engine.md) can now be configured using [authentication](azure-ad-authentication-sql-server-overview.md) with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), and it supports two mechanisms for providing credentials:
20
+
[Linked servers](../../linked-servers/linked-servers-database-engine.md) can now be configured using [authentication](azure-ad-authentication-sql-server-overview.md) with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), and it supports three mechanisms for providing credentials:
20
21
21
22
- Password
22
23
- Access token
24
+
- Managed identity (SQL Server 2025 and later)
25
+
26
+
This article covers password and access token authentication. For SQL Server 2025 and later, you can also use managed identity authentication for linked servers. For more information, see [Configure managed identity for linked servers](../../../sql-server/azure-arc/managed-identity-support-linked-server.md).
23
27
24
28
This article assumes there are two SQL Server instances (`S1` and `S2`). Both have been configured to support Microsoft Entra authentication, and they trust each other's SSL/TLS certificate. The examples in this article are executed on server `S1` to create a linked server to server `S2`.
25
29
@@ -28,10 +32,10 @@ This article assumes there are two SQL Server instances (`S1` and `S2`). Both ha
28
32
- Fully operational Microsoft Entra authentication for SQL Server. For more information, see [Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-overview.md) and [Tutorial: Set up Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-setup-tutorial.md).
29
33
-[SQL Server Management Studio (SSMS)](/ssms/install/install) version 18.0 or higher.
30
34
31
-
> [!NOTE]
35
+
> [!NOTE]
32
36
> The subject name of the SSL/TLS certificate used by `S2` must match the server name provided in the [`provstr`](../../system-stored-procedures/sp-addlinkedserver-transact-sql.md) attribute. This should either be the Fully Qualified Domain Name (**FQDN**) or **hostname** of `S2`.
## Linked server configurations for Microsoft Entra authentication
37
41
@@ -54,7 +58,7 @@ For password authentication, using `Authentication=ActiveDirectoryPassword` in t
54
58
-**Provider string**: `Server=<fqdn of S2>;Authentication=ActiveDirectoryPassword`.
55
59
-**Catalog**: leave empty.
56
60
57
-
:::image type="content" source="media/create-linked-server-with-password-authentication.png" alt-text="Screenshot of creating linked server with password authentication":::
61
+
:::image type="content" source="media/create-linked-server-with-password-authentication.png" alt-text="Screenshot of creating linked server with password authentication." lightbox="media/create-linked-server-with-password-authentication.png":::
58
62
59
63
1. Select the **Security** tab.
60
64
1. Select **Add**.
@@ -65,13 +69,13 @@ For password authentication, using `Authentication=ActiveDirectoryPassword` in t
65
69
-**For a login not defined in the list above, connections will**: `Not be made`
66
70
1. Select **OK**.
67
71
68
-
:::image type="content" source="media/linked-server-add-security.png" alt-text="Screenshot of setting security for linked server":::
72
+
:::image type="content" source="media/linked-server-add-security.png" alt-text="Screenshot of setting security for linked server." lightbox="media/linked-server-add-security.png":::
69
73
70
74
### Linked server configuration using access token authentication
71
75
72
76
For access token authentication, the linked server is created with `AccessToken=%s` in the **Provider string**. A linked server login is created to map each login in `S1` to a [Microsoft Entra application](/azure/azure-sql/database/authentication-aad-service-principal), which has been granted login permissions to `S2`. The application must have a secret assigned to it, which will be used by `S1` to generate the access token. A secret can be created by navigating to the [Azure portal](https://portal.azure.com) > **Microsoft Entra ID** > **App registrations** > `YourApplication` > **Certificates & secrets** > **New client secret**.
73
77
74
-
:::image type="content" source="media/application-new-client-secret.png" alt-text="Screenshot of creating a new client secret for an application in the Azure portal":::
78
+
:::image type="content" source="media/application-new-client-secret.png" alt-text="Screenshot of creating a new client secret for an application in the Azure portal." lightbox="media/application-new-client-secret.png":::
75
79
76
80
1. In SSMS, connect to `S1` and expand **Server Objects** in the **Object Explorer** window.
77
81
1. Right-click **Linked Servers** and select **New Linked Server**.
@@ -84,7 +88,7 @@ For access token authentication, the linked server is created with `AccessToken=
84
88
-**Provider string**: `Server=<fqdn of S2>;AccessToken=%s`.
85
89
-**Catalog**: leave empty.
86
90
87
-
:::image type="content" source="media/create-linked-server-with-access-token-authentication.png" alt-text="Screenshot of creating linked server with access token authentication":::
91
+
:::image type="content" source="media/create-linked-server-with-access-token-authentication.png" alt-text="Screenshot of creating linked server with access token authentication." lightbox="media/create-linked-server-with-access-token-authentication.png":::
88
92
89
93
1. Select the **Security** tab.
90
94
1. Select **Add**.
@@ -95,8 +99,9 @@ For access token authentication, the linked server is created with `AccessToken=
95
99
-**For a login not defined in the list above, connections will**: `Not be made`
96
100
1. Select **OK**.
97
101
98
-
## See also
102
+
## Related content
99
103
100
-
-[Connect SQL Server to Azure Arc](../../../sql-server/azure-arc/connect.md)
104
+
-[Configure managed identity for linked servers](../../../sql-server/azure-arc/managed-identity-support-linked-server.md)
105
+
-[Connect your SQL Server to Azure Arc](../../../sql-server/azure-arc/connect.md)
101
106
-[Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-overview.md)
102
-
-[Tutorial: Set up Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-setup-tutorial.md)
107
+
-[Tutorial: Set up Microsoft Entra authentication for SQL Server with app registration](azure-ad-authentication-sql-server-setup-tutorial.md)
0 commit comments