Azure SQL Managed Instance Private Endpoint - Importing Data Via SSMS with OLE DB Driver

Carmelo LoPresti 20 Reputation points
2023-05-05T20:45:01.65+00:00

I have an Azure SQL Managed Instance that is using a Private Endpoint which is in Preview.

The Local vNet endpoint and the Private Endpoint are on the same vNet, but different Subnets. Ultimate goal is to disable Public access all together.

I've reviewed the documentation on creating a Private Endpoint on a SQL Managed Instance, and I am able to log into SSMS with the private endpoint link, but only if I select "Trust Server Certificate." That works fine.

The issue is when I try to use the "Data Import" feature on a Database hosted on the MI using OLE DB Driver option, and input the same connection string (private endpoint, trust server certificate, encryption disabled), I get the error below. Connecting via the public endpoint works fine.

I believe it has to do with the certificate mismatch in the SQL name, however, why does it allow me to log in via SSMS, but will not allow a data import with the OLE DB driver feature? Is this a supported configuration?

[Microsoft OLE DB Driver for SQL Server]: Client Unable to establish Connection

[Microsoft OLE DB Driver for SQL Server]: SSL Provider: The target principal name is incorrect.

Azure SQL Database
Azure
Azure
A cloud computing platform and infrastructure for building, deploying and managing applications and services through a worldwide network of Microsoft-managed datacenters.
Azure Private Link
Azure Private Link
An Azure service that provides private connectivity from a virtual network to Azure platform as a service, customer-owned, or Microsoft partner services.
SQL Server | Other
{count} votes

Answer accepted by question author
  1. Oury Ba-MSFT 21,126 Reputation points Microsoft Employee Moderator
    2023-05-18T17:44:46.8666667+00:00

    Carmelo LoPresti

    Sorry for the delay in response to your question. I was able to check internally and seems like the issue is with Azure Active Directory authentication and server certificates. To work around this, either move the private endpoint(s) to a different VNet giving them the correct DNS zone, or peer this VNet with a new VNet in which, again, the correct DNS zone will exist.

    Our Product Group is aware of this and will be fixing in due time.

    Regards,

    Oury

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.