Azure Private Link for Azure SQL Database and Azure Synapse Analytics

Applies to: Azure SQL Database Azure Synapse Analytics (dedicated SQL pools only)

Private Link allows you to connect to various PaaS services in Azure via a private endpoint. For a list of PaaS services that support Private Link functionality, go to the Private Link Documentation page. A private endpoint is a private IP address within a specific VNet and subnet.


This article applies to both Azure SQL Database and dedicated SQL pool (formerly SQL DW) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server. For simplicity, the term 'database' refers to both databases in Azure SQL Database and Azure Synapse Analytics. Likewise, any references to 'server' is referring to the logical server that hosts Azure SQL Database and dedicated SQL pool (formerly SQL DW) in Azure Synapse Analytics. This article does not apply to Azure SQL Managed Instance or dedicated SQL pools in Azure Synapse Analytics workspaces.

Creation process

Private Endpoints can be created using the Azure portal, PowerShell, or the Azure CLI:

Approval process

Once the network admin creates the Private Endpoint (PE), the SQL admin can manage the Private Endpoint Connection (PEC) to SQL Database.

  1. Navigate to the server resource in the Azure portal as per steps shown in the following screenshot.

    • (1) Select the Private endpoint connections in the left pane
    • (2) Shows a list of all Private Endpoint Connections (PECs)
    • (3) Corresponding Private Endpoint (PE) created

    Screenshot showing all of the PECs.

  2. Choose an individual PEC from the list by selecting it.

    Screenshot showing the selected PEC.

  3. The SQL admin can choose to approve or reject a PEC and optionally add a short text response.

    Screenshot showing the PEC approval.

  4. After approval or rejection, the list will reflect the appropriate state along with the response text.

    Screenshot of all PECs after approval.

  5. Finally selecting the private endpoint name

    Screenshot showing PEC details with the endpoint name.

    leads to the Network Interface details

    Screenshot showing the NIC details.

    which finally leads to the IP address for the private endpoint

    Screenshot showing the private IP address.


When you add a private endpoint connection, public routing to your logical server isn't blocked by default. In the Firewall and virtual networks pane, the setting Deny public network access isn't selected by default. To disable public network access, ensure that you select Deny public network access.

Disable public access to your logical server

For this scenario, assume you want to disable all public access to your logical server and allow connections only from your virtual network.

First, ensure that your private endpoint connections are enabled and configured. Then, to disable public access to your logical server:

  1. Go to the Networking page of your logical server.

  2. Select the Deny public network access checkbox.

    Screenshot that shows selecting the Deny public network access option.

Test connectivity to SQL Database from an Azure VM in same virtual network

For this scenario, assume you've created an Azure Virtual Machine (VM) running a recent version of Windows in the same virtual network as the private endpoint.

  1. Start a Remote Desktop (RDP) session and connect to the virtual machine.

  2. You can then do some basic connectivity checks to ensure that the VM is connecting to SQL Database via the private endpoint using the following tools:

    • Telnet
    • PsPing
    • Nmap
    • SQL Server Management Studio (SSMS)

Check connectivity using Telnet

Telnet Client is a Windows feature that can be used to test connectivity. Depending on the version of the Windows OS, you may need to enable this feature explicitly.

Open a Command Prompt window after you have installed Telnet. Run the Telnet command and specify the IP address and private endpoint of the database in SQL Database.

telnet 1433

When Telnet connects successfully, it outputs a blank screen at the command window, as shown in the following image:

Diagram of the Telnet window with blank screen.

Use PowerShell command to check the connectivity:

Test-NetConnection -computer -port 1433

Check Connectivity using PsPing

PsPing can be used as follows to check that the private endpoint is listening for connections on port 1433.

Run PsPing as follows by providing the FQDN for logical SQL server and port 1433:


This is an example of the expected output:

TCP connect to
5 iterations (warmup 1) ping test:
Connecting to (warmup): from 2.83ms
Connecting to from 1.26ms
Connecting to from 1.98ms
Connecting to from 1.43ms
Connecting to from 2.28ms

The output show that PsPing could ping the private IP address associated with the private endpoint.

Check connectivity using Nmap

Nmap (Network Mapper) is a free and open-source tool used for network discovery and security auditing. For more information and the download link, visit You can use this tool to ensure that the private endpoint is listening for connections on port 1433.

Run Nmap as follows by providing the address range of the subnet that hosts the private endpoint.

Nmap -n -sP

This is an example of the expected output:

Nmap scan report for
Host is up (0.00s latency).
Nmap done: 256 IP addresses (1 host up) scanned in 207.00 seconds

The result shows that one IP address is up; which corresponds to the IP address for the private endpoint.

Check connectivity using SQL Server Management Studio (SSMS)


Use the Fully Qualified Domain Name (FQDN) of the server in connection strings for your clients (<server> Any login attempts made directly to the IP address or using the private link FQDN (<server> shall fail. This behavior is by design, since private endpoint routes traffic to the SQL Gateway in the region and the correct FQDN needs to be specified for logins to succeed.

Follow the steps here to use SSMS to connect to the SQL Database. After you connect to the SQL Database using SSMS, the following query shall reflect client_net_address that matches the private IP address of the Azure VM you're connecting from:

SELECT client_net_address
FROM sys.dm_exec_connections
WHERE session_id = @@SPID;

Using Redirect connection policy with private endpoints

We recommend that customers use the private link with the redirect connection policy for reduced latency and improved throughput. For connections to use this mode, clients need to:

  • Allow outbound communication from the VNET hosting the private endpoint to port range 1433 to 65535.
  • Use the latest version of drivers that have redirect support built in. Redirect support is included in ODBC, OLEDB, NET SqlClient Data Provider, Core .NET SqlClient Data Provider, and JDBC (version 9.4 or above) drivers. Connections originating from all other drivers are proxied.

To use a private endpoint with the redirect connection policy, change connection policy to redirect.

If it isn't feasible to modify the firewall settings to allow outbound access on the 1433-65535 port range, an alternative solution is to change the connection policy to Proxy.


The following regions support redirect with private endpoints: Australia Central, Australia Central 2, Australia East, Australia Southeast, Brazil South, Canada Central, Canada East, Central US, East Asia, East US, East US 2, France Central, Germany West Central,Central India, South India, West India, Japan East, Japan West, Korea Central, Korea South, North Central US, North Europe, Norway East,South Africa North, South Central US, South East Asia, Switzerland North,UAE North, UK South, UK West, West Central US, West Europe, West US, West US 2, West US 3.

Regions missing from this list are in the process of being enabled for private endpoints with the redirect connection policy.

On-premises connectivity over private peering

When customers connect to the public endpoint from on-premises machines, their IP address needs to be added to the IP-based firewall using a Server-level firewall rule. While this model works well for allowing access to individual machines for dev or test workloads, it's difficult to manage in a production environment.

With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.

Clients can connect to the Private endpoint from the same virtual network, peered virtual network in same region, or via virtual network to virtual network connection across regions. Additionally, clients can connect from on-premises using ExpressRoute, private peering, or VPN tunneling. The following simplified diagram shows the common use cases.

Diagram of connectivity option.

In addition, services that aren't running directly in the virtual network but are integrated with it (for example, App Service web apps or Functions) can also achieve private connectivity to the database. For more information on this specific use case, see the Web app with private connectivity to Azure SQL database architecture scenario.

Connect from an Azure VM in Peered Virtual Network

Configure virtual network peering to establish connectivity to the SQL Database from an Azure VM in a peered virtual network.

Connect from an Azure VM in virtual network to virtual network environment

Configure virtual network to virtual network VPN gateway connection to establish connectivity to a database in SQL Database from an Azure VM in a different region or subscription.

Connect from an on-premises environment over VPN

To establish connectivity from an on-premises environment to the database in SQL Database, choose and implement one of the options:

Consider DNS configuration scenarios as well, as the FQDN of the service can resolve to the public IP address.

Connect from Azure Synapse Analytics to Azure Storage using PolyBase and the COPY statement

PolyBase and the COPY statement are commonly used to load data into Azure Synapse Analytics from Azure Storage accounts. If the Azure Storage account, which you're loading data from, limits access only to a set of virtual network subnets via Private Endpoints, Service Endpoints, or IP-based firewalls, the connectivity from PolyBase and the COPY statement to the account will break. For enabling both import and export scenarios with Azure Synapse Analytics connecting to Azure Storage that's secured to a virtual network, follow the steps provided here.

Data exfiltration prevention

Data exfiltration in Azure SQL Database is when a user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.

Consider a scenario with a user running SQL Server Management Studio (SSMS) inside an Azure virtual machine connecting to a database in SQL Database. This database is in the West US data center. The following example shows how to limit access with public endpoints on SQL Database using network access controls.

  1. Disable all Azure service traffic to SQL Database via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server and database level firewall rules. For more information, see Azure SQL Database and Azure Synapse Analytics network access controls.
  2. Only allow traffic to the database in SQL Database using the Private IP address of the VM. For more information, see the articles on Service Endpoint and virtual network firewall rules.
  3. On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
    • Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to SQL Database in West US
    • Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to SQL Database in all regions

At the end of this setup, the Azure VM can connect only to a database in SQL Database in the West US region. However, the connectivity isn't restricted to a single database in SQL Database. The VM can still connect to any database in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we haven't eliminated it altogether.

With Private Link, customers can now set up network access controls like NSGs to restrict access to the private endpoint. Individual Azure PaaS resources are then mapped to specific private endpoints. A malicious insider can only access the mapped PaaS resource (for example a database in SQL Database) and no other resource.

Next steps