You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/connectivity-settings.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,18 +12,18 @@ ms.topic: conceptual
12
12
13
13
# Azure Synapse Analytics connectivity settings
14
14
15
-
This article explains connectivity settings in Azure Synapse Analytics and how to configure them where applicable.
15
+
This article explains how to configure connectivity settings in Azure Synapse Analytics, including both dedicated SQL pools and serverless SQL pools where applicable.
16
16
17
17
For connection strings to Azure Synapse Analytics pools, see [Connect to Synapse SQL](../sql/connect-overview.md).
18
18
19
-
The capabilities and Azure portal appearance of configuring a dedicated SQL pool depend on whether it is in a logical SQL server or an Azure Synapse Analytics workspace.
19
+
Connectivity settings and the Azure portal experience for dedicated SQL pools differ depending on whether the pool is deployed in a standalone dedicated SQL pools (formerly SQL DW) or in an Azure Synapse Analytics workspace. In contrast, serverless SQL pools are only available in Synapse workspaces and follow the same connectivity settings as dedicated SQL pools created in a workspace.
20
20
21
-
### [Dedicated SQL pools in a workspace](#tab/workspace)
21
+
### [Dedicated and Serverless SQL pools in a workspace](#tab/workspace)
22
22
23
23
## Public network access
24
24
25
25
> [!NOTE]
26
-
> These settings apply to dedicated SQL pools (formerly SQL DW) in an Azure Synapse analytics workspace. These instructions do not apply dedicated SQL pools (formerly SQL DW) associated with the logical SQL server.
26
+
> These settings apply to dedicated SQL pools and serverless SQL pools created in an Azure Synapse workspace. These instructions do not apply to dedicated SQL pools associated with a standalone dedicated SQL pools (formerly SQL DW).
27
27
28
28
You can use the public network access feature to allow incoming public network connectivity to your Azure Synapse workspace.
29
29
@@ -76,7 +76,7 @@ Since December 2021, a minimum level of TLS 1.2 is required for workspace-manage
76
76
Azure policy to prevent modifications to the networking settings in Synapse Workspace is not currently available.
77
77
78
78
79
-
### [Dedicated SQL pools in a logical SQL server](#tab/logical-sql-server)
@@ -261,9 +261,9 @@ You can also query [sys.fn_get_audit_file](/sql/relational-databases/system-func
261
261
262
262
## Connection policy
263
263
264
-
The connection policy for Synapse SQL in Azure Synapse Analytics is set to **Default**. You cannot change the connection policy for dedicated SQL pools in Azure Synapse Analytics.
264
+
The connection policy for Synapse SQL in Azure Synapse Analytics is set to **Default**. You cannot change the connection policy for dedicated or serverless SQL pools in Azure Synapse Analytics.
265
265
266
-
Logins for dedicated SQL pools in Azure Synapse Analytics can land on **any of the individual Gateway IP addresses or Gateway IP address subnets in a region**. For consistent connectivity, allow network traffic to and from **all the individual Gateway IP addresses and Gateway IP address subnets** in a region. Refer to the [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
266
+
Logins for SQL pools in Azure Synapse Analytics can land on **any of the individual Gateway IP addresses or Gateway IP address subnets in a region**. For consistent connectivity, allow network traffic to and from **all the individual Gateway IP addresses and Gateway IP address subnets** in a region. Refer to the [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
267
267
268
268
-**Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is:
269
269
-`Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine).
0 commit comments