Unknown login DB000009\WF-3NA2FzD74odWt2n accessing Azure SQL — legitimate managed identity or security risk?

Michael Clemans 140 Puntos de reputación
2025-11-26T19:40:53.41+00:00

I have noticed activity on my Azure Synapse dedicated pool from a login named DB000009\WF-3NA2FzD74odWt2n. This identity has executed queries that moved a large number of rows and consumed significant resources, but I do not recognize it as a human user, nor does it correspond to a known machine name.

Imagen del usuario

Imagen del usuario

Here are my questions:

Could this be a Managed Identity / Service Principal in Azure AD used by some service (e.g. App Service, Azure Data Factory, Synapse)?

How can I reliably determine which exact Azure resource is using that identity to connect to the database?

Given this unexpected access, what measures should I implement to ensure it is not exfiltrating data (e.g. set up auditing, alerts, restrict permissions)?

I appreciate any guidance or examples for detecting, investigating, and mitigating potential misuse.

Azure Synapse Analytics
Azure Synapse Analytics
Un servicio de análisis de Azure que aúna la integración de datos, el almacenamiento de datos empresariales y el análisis de macrodatos. Anteriormente se conocía como Azure SQL Data Warehouse.
{count} votos

1 respuesta

Ordenar por: Muy útil
  1. Anónimas
    2025-11-27T00:28:14.5+00:00

    Hi @Michael Clemans,
    Welcome to the Microsoft Q&A and thank you for posting your questions here.
    This error usually occurs when the authentication method does not match the account configuration. Common causes include:

    • Using local account keys when the account requires Azure AD (Entra ID) authentication.
    • Token issued from a different tenant than the Cosmos DB account.
    • Missing role assignment for the user.

    fix:

    Use Entra ID authentication\ Sign in via https://cosmos.azure.com using Entra ID credentials.

    Assign the correct role\ Ensure the user has the Cosmos DB Built-in Data Contributor role. You can assign it using Azure CLI or PowerShell:

    az cosmosdb sql role assignment create \

      --account-name <CosmosAccountName> \

      --resource-group <ResourceGroupName> \

      --role-definition-id <RoleDefinitionId> \

      --scope "/" \

    1. Verify tenant alignment\ If the token comes from a different tenant, switch to the correct directory before logging in.

    For details, see https://learn.microsoft.com/azure/cosmos-db/how-to-setup-rbac.

    0 comentarios No hay comentarios

Su respuesta

Las respuestas pueden ser marcadas como "Aceptadas" por el autor de la pregunta y "Recomendadas" por los moderadores, lo que ayuda a los usuarios a saber que la respuesta ha resuelto el problema del autor.