Found 15 bookmarks
Newest
Row-Level Security - SQL Server
Row-Level Security - SQL Server
Learn how Row-Level Security uses group membership or execution context to control access to rows in a database table in SQL Server.
·docs.microsoft.com·
Row-Level Security - SQL Server
Delegate access with a shared access signature - Azure Storage
Delegate access with a shared access signature - Azure Storage
A shared access signature (SAS) is a URI that grants restricted access rights to Azure Storage resources. You can provide a shared access signature to clients who should not be trusted with your storage account key when you want to delegate access to certain storage account resources.
A user delegation SAS, introduced with version 2018-11-09. A user delegation SAS is secured with Azure AD credentials. This type of SAS is supported for the Blob service only and can be used to grant access to containers and blobs.
·docs.microsoft.com·
Delegate access with a shared access signature - Azure Storage
Managed identities for Azure resources
Managed identities for Azure resources
An overview of the managed identities for Azure resources.
Managed identities provide an identity for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications may use the managed identity to obtain Azure AD tokens. With Azure Key Vault, developers can use managed identities to access resources. Key Vault stores credentials in a secure manner and gives access to storage accounts.
a managed identity is a service principal of a special type that can only be used with Azure resources. When the managed identity is deleted, the corresponding service principal is automatically removed.
·docs.microsoft.com·
Managed identities for Azure resources
Column-level security for dedicated SQL pool - Azure Synapse Analytics
Column-level security for dedicated SQL pool - Azure Synapse Analytics
Column-Level Security allows customers to control access to database table columns based on the user's execution context or group membership, simplifying the design and coding of security in your application, and allowing you to implement restrictions on column access.
Column-Level security allows customers to control access to table columns based on the user's execution context or group membership.
·docs.microsoft.com·
Column-level security for dedicated SQL pool - Azure Synapse Analytics
Row-Level Security - SQL Server
Row-Level Security - SQL Server
Learn how Row-Level Security uses group membership or execution context to control access to rows in a database table in SQL Server.
·docs.microsoft.com·
Row-Level Security - SQL Server
What is Azure role-based access control (Azure RBAC)?
What is Azure role-based access control (Azure RBAC)?
Get an overview of Azure role-based access control (Azure RBAC). Use role assignments to control access to Azure resources.
Azure role-based access control (Azure RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.
·docs.microsoft.com·
What is Azure role-based access control (Azure RBAC)?
Grant limited access to data with shared access signatures (SAS) - Azure Storage
Grant limited access to data with shared access signatures (SAS) - Azure Storage
Learn about using shared access signatures (SAS) to delegate access to Azure Storage resources, including blobs, queues, tables, and files.
A shared access signature (SAS) provides secure delegated access to resources in your storage account. With a SAS, you have granular control over how a client can access your data.
three types of shared access signatures
A user delegation SAS is secured with Azure Active Directory (Azure AD) credentials and also by the permissions specified for the SAS. A user delegation SAS applies to Blob storage only.
A service SAS is secured with the storage account key. A service SAS delegates access to a resource in only one of the Azure Storage services: Blob storage, Queue storage, Table storage, or Azure Files.
An account SAS is secured with the storage account key. An account SAS delegates access to resources in one or more of the storage services. All of the operations available via a service or user delegation SAS are also available via an account SAS.
·docs.microsoft.com·
Grant limited access to data with shared access signatures (SAS) - Azure Storage
Transparent data encryption (TDE) - SQL Server
Transparent data encryption (TDE) - SQL Server
Learn about transparent data encryption, which encrypts SQL Server, Azure SQL Database, and Azure Synapse Analytics data, known as encrypting data at rest.
Transparent data encryption (TDE) encrypts SQL Server, Azure SQL Database, and Azure Synapse Analytics data files. This encryption is known as encrypting data at rest.
One solution is to encrypt sensitive data in a database and use a certificate to protect the keys that encrypt the data. This solution prevents anyone without the keys from using the data. But you must plan this kind of protection in advance.
TDE protects data at rest, which is the data and log files.
·docs.microsoft.com·
Transparent data encryption (TDE) - SQL Server
Transparent data encryption - Azure SQL Database & SQL Managed Instance & Azure Synapse Analytics
Transparent data encryption - Azure SQL Database & SQL Managed Instance & Azure Synapse Analytics
An overview of transparent data encryption for Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics. The document covers its benefits and the options for configuration, which includes service-managed transparent data encryption and Bring Your Own Key.
Transparent data encryption (TDE) helps protect Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics against the threat of malicious offline activity by encrypting data at rest. It performs real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application. By default, TDE is enabled for all newly deployed Azure SQL Databases and must be manually enabled for older databases of Azure SQL Database.
·docs.microsoft.com·
Transparent data encryption - Azure SQL Database & SQL Managed Instance & Azure Synapse Analytics
Dynamic data masking - Azure SQL Database
Dynamic data masking - Azure SQL Database
Dynamic data masking limits sensitive data exposure by masking it to non-privileged users for Azure SQL Database, Azure SQL Managed Instance and Azure Synapse Analytics
Dynamic data masking helps prevent unauthorized access to sensitive data by enabling customers to designate how much of the sensitive data to reveal with minimal impact on the application layer. It’s a policy-based security feature that hides the sensitive data in the result set of a query over designated database fields, while the data in the database is not changed.
·docs.microsoft.com·
Dynamic data masking - Azure SQL Database