Skip to content

Commit 7730bd2

Browse files
Merge pull request #36085 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-16 18:30 UTC
2 parents 2eb49c4 + 279fd7a commit 7730bd2

5 files changed

Lines changed: 267 additions & 29 deletions

File tree

azure-sql/database/serverless-tier-overview.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes the new serverless compute tier and compares
44
author: WilliamDAssafMSFT
55
ms.author: wiassaf
66
ms.reviewer: moslake, mathoma, dfurman, blakhani
7-
ms.date: 12/12/2025
7+
ms.date: 12/15/2025
88
ms.service: azure-sql-database
99
ms.subservice: service-overview
1010
ms.topic: conceptual
@@ -207,6 +207,10 @@ Auto-resuming is triggered if any of the following conditions are true at any ti
207207

208208
Monitoring, management, or other solutions performing any of these operations trigger auto-resuming. Auto-resuming is also triggered during the deployment of some service updates that require the database be online.
209209

210+
#### Auto-resume trigger indentification
211+
212+
Auto-resume triggers are exposed in the Azure Monitor activity log for **Resume Databases** operations under the `Caller` property in the JSON of the **Succeeded** event.
213+
210214
### Connectivity
211215

212216
If a serverless database is paused, the first connection attempt resumes the database and returns an error stating that the database is unavailable with error code 40613. Once the database is resumed, retry the connection. Database clients following [connection retry logic recommendations](/azure/architecture/patterns/retry) should not need to be modified. For connection retry logic options and recommendations, see:

docs/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-linked-server.md

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,29 @@
11
---
2-
title: "Linked server for SQL Server with Microsoft Entra authentication"
2+
title: "Linked Server for SQL Server with Microsoft Entra Authentication"
33
description: Learn about how to use linked server for SQL Server with Microsoft Entra authentication
44
author: PratimDasgupta
55
ms.author: prdasgu
66
ms.reviewer: vanto, randolphwest
7-
ms.date: 07/25/2022
7+
ms.date: 12/15/2025
88
ms.service: sql
99
ms.subservice: security
10-
ms.topic: conceptual
11-
monikerRange: ">=sql-server-ver15||>= sql-server-linux-ver16"
12-
ms.custom: sfi-image-nochange
10+
ms.topic: article
11+
ms.custom:
12+
- sfi-image-nochange
13+
monikerRange: ">=sql-server-ver15 || >=sql-server-linux-ver16"
1314
---
1415

1516
# Linked server for SQL Server with Microsoft Entra authentication
1617

17-
[!INCLUDE [SQL Server 2022](../../../includes/applies-to-version/sqlserver2022.md)]
18+
[!INCLUDE [SQL Server 2022 and later](../../../includes/applies-to-version/sqlserver2022-and-later.md)]
1819

19-
[Linked servers](../../linked-servers/linked-servers-database-engine.md) can now be configured using [authentication](azure-ad-authentication-sql-server-overview.md) with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), and it supports two mechanisms for providing credentials:
20+
[Linked servers](../../linked-servers/linked-servers-database-engine.md) can now be configured using [authentication](azure-ad-authentication-sql-server-overview.md) with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)), and it supports three mechanisms for providing credentials:
2021

2122
- Password
2223
- Access token
24+
- Managed identity (SQL Server 2025 and later)
25+
26+
This article covers password and access token authentication. For SQL Server 2025 and later, you can also use managed identity authentication for linked servers. For more information, see [Configure managed identity for linked servers](../../../sql-server/azure-arc/managed-identity-support-linked-server.md).
2327

2428
This article assumes there are two SQL Server instances (`S1` and `S2`). Both have been configured to support Microsoft Entra authentication, and they trust each other's SSL/TLS certificate. The examples in this article are executed on server `S1` to create a linked server to server `S2`.
2529

@@ -28,10 +32,10 @@ This article assumes there are two SQL Server instances (`S1` and `S2`). Both ha
2832
- Fully operational Microsoft Entra authentication for SQL Server. For more information, see [Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-overview.md) and [Tutorial: Set up Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-setup-tutorial.md).
2933
- [SQL Server Management Studio (SSMS)](/ssms/install/install) version 18.0 or higher.
3034

31-
> [!NOTE]
35+
> [!NOTE]
3236
> The subject name of the SSL/TLS certificate used by `S2` must match the server name provided in the [`provstr`](../../system-stored-procedures/sp-addlinkedserver-transact-sql.md) attribute. This should either be the Fully Qualified Domain Name (**FQDN**) or **hostname** of `S2`.
3337
34-
<a name='linked-server-configurations-for-azure-ad-authentication'></a>
38+
<a id="linked-server-configurations-for-azure-ad-authentication"></a>
3539

3640
## Linked server configurations for Microsoft Entra authentication
3741

@@ -54,7 +58,7 @@ For password authentication, using `Authentication=ActiveDirectoryPassword` in t
5458
- **Provider string**: `Server=<fqdn of S2>;Authentication=ActiveDirectoryPassword`.
5559
- **Catalog**: leave empty.
5660

57-
:::image type="content" source="media/create-linked-server-with-password-authentication.png" alt-text="Screenshot of creating linked server with password authentication":::
61+
:::image type="content" source="media/create-linked-server-with-password-authentication.png" alt-text="Screenshot of creating linked server with password authentication." lightbox="media/create-linked-server-with-password-authentication.png":::
5862

5963
1. Select the **Security** tab.
6064
1. Select **Add**.
@@ -65,13 +69,13 @@ For password authentication, using `Authentication=ActiveDirectoryPassword` in t
6569
- **For a login not defined in the list above, connections will**: `Not be made`
6670
1. Select **OK**.
6771

68-
:::image type="content" source="media/linked-server-add-security.png" alt-text="Screenshot of setting security for linked server":::
72+
:::image type="content" source="media/linked-server-add-security.png" alt-text="Screenshot of setting security for linked server." lightbox="media/linked-server-add-security.png":::
6973

7074
### Linked server configuration using access token authentication
7175

7276
For access token authentication, the linked server is created with `AccessToken=%s` in the **Provider string**. A linked server login is created to map each login in `S1` to a [Microsoft Entra application](/azure/azure-sql/database/authentication-aad-service-principal), which has been granted login permissions to `S2`. The application must have a secret assigned to it, which will be used by `S1` to generate the access token. A secret can be created by navigating to the [Azure portal](https://portal.azure.com) > **Microsoft Entra ID** > **App registrations** > `YourApplication` > **Certificates & secrets** > **New client secret**.
7377

74-
:::image type="content" source="media/application-new-client-secret.png" alt-text="Screenshot of creating a new client secret for an application in the Azure portal":::
78+
:::image type="content" source="media/application-new-client-secret.png" alt-text="Screenshot of creating a new client secret for an application in the Azure portal." lightbox="media/application-new-client-secret.png":::
7579

7680
1. In SSMS, connect to `S1` and expand **Server Objects** in the **Object Explorer** window.
7781
1. Right-click **Linked Servers** and select **New Linked Server**.
@@ -84,7 +88,7 @@ For access token authentication, the linked server is created with `AccessToken=
8488
- **Provider string**: `Server=<fqdn of S2>;AccessToken=%s`.
8589
- **Catalog**: leave empty.
8690

87-
:::image type="content" source="media/create-linked-server-with-access-token-authentication.png" alt-text="Screenshot of creating linked server with access token authentication":::
91+
:::image type="content" source="media/create-linked-server-with-access-token-authentication.png" alt-text="Screenshot of creating linked server with access token authentication." lightbox="media/create-linked-server-with-access-token-authentication.png":::
8892

8993
1. Select the **Security** tab.
9094
1. Select **Add**.
@@ -95,8 +99,9 @@ For access token authentication, the linked server is created with `AccessToken=
9599
- **For a login not defined in the list above, connections will**: `Not be made`
96100
1. Select **OK**.
97101

98-
## See also
102+
## Related content
99103

100-
- [Connect SQL Server to Azure Arc](../../../sql-server/azure-arc/connect.md)
104+
- [Configure managed identity for linked servers](../../../sql-server/azure-arc/managed-identity-support-linked-server.md)
105+
- [Connect your SQL Server to Azure Arc](../../../sql-server/azure-arc/connect.md)
101106
- [Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-overview.md)
102-
- [Tutorial: Set up Microsoft Entra authentication for SQL Server](azure-ad-authentication-sql-server-setup-tutorial.md)
107+
- [Tutorial: Set up Microsoft Entra authentication for SQL Server with app registration](azure-ad-authentication-sql-server-setup-tutorial.md)

0 commit comments

Comments
 (0)