Migrar a Innovate Summit:
Obteña máis información acerca de como migrar e modernizar a Azure pode aumentar o rendemento, a resiliencia e a seguridade do seu negocio, o que lle permite abrazar completamente a IA.Rexistrar agora
Este explorador xa non é compatible.
Actualice a Microsoft Edge para dispoñer das funcionalidades máis recentes, as actualizacións de seguranza e a asistencia técnica.
Starting with SQL Server 2022 Cumulative Update 17 (CU17), managed identities are supported for EKM with AKV and Managed Hardware Security Modules (HSM) on SQL Server on Azure VMs. Managed identities are the recommended authentication method to allow different Azure services to authenticate the SQL Server on Azure VM resource without using passwords or secrets. For more information on managed identities, see Managed identity types.
Nota
Managed identities are only supported for SQL Server on Azure VMs and not for SQL Server on-premises.
To have the Key Vault Crypto Service Encryption User role for the primary managed identity assigned to the key vault if you're using Azure role-based access control or the Unwrap Key and Wrap Key permissions if you're using vault access policy.
Before you can create a credential using a managed identity, you need to add a registry key to enable the EKM provider to use managed identities. This step needs to be performed by the computer administrator. For detailed steps, see Step 4: Add registry key to support EKM provider.
Create a server credential using managed identities
The following example shows how to create a credential for a managed identity to use with the AKV:
T-SQL commands to upgrade existing EKM configuration to use managed identities
If your current configuration is using EKM with AKV using a secret, you'll need to drop the existing credential and create a new credential using a managed identity. The following T-SQL commands show how to upgrade your existing EKM configuration to use managed identities:
Trace flag 4675 can be used to check credentials created with a managed identity. If the CREATE CREDENTIAL statement was executed without trace flag 4675 enabled, no error message is issued if the primary managed identity isn't set for the server. To troubleshoot this scenario, the credential must be deleted and recreated again once the trace flag is enabled.
No primary managed identity assigned
If a primary managed identity isn't assigned to the SQL Server on Azure VM, the backup and restore operations will fail with an error message indicating that the managed identity isn't selected.
SQL
Msg 37563, Level 16, State 2, Line 14
The primary managed identity is not selected for this server. Enable the primary managed identity for Microsoft Entra authentication for this server. For more information see (https://aka.ms/sql-server-managed-identity-doc).`
SQL Server Connector version does not support the managed identity for EKM with AKV
If a previous SQL Server Connector version is used, the following error occurs when executing the T-SQL CREATE ASYMMETRIC KEY statement using a server credential with managed identity:
SQL
Msg 37576, Level 16, State 2, Line 60
The current SQL Server Connector version for Microsoft Azure Key Vault does not support the managed identity (see https://aka.ms/sql-server-managed-identity-doc). Upgrade the SQL Server Connector to its latest version
Limitations
Server-level managed identity is only supported for SQL Server on Azure VM, and not on SQL Server on-premises. Server-level managed identity isn't supported for Linux.
Managed identity support for EKM with AKV requires the latest SQL Server Connector version. Make sure you download and install the latest version from the Microsoft Download Center.
Microsoft Entra authentication can only be enabled with one primary managed identity for the SQL Server on Azure VM. The primary managed identity is used for all SQL Server instances on the VM.
Muestre las características de Microsoft Entra ID para modernizar las soluciones de identidad, implementar soluciones híbridas e implementar la gobernanza de identidades.