Hello Kyle Sicard
By configuring the NSG to allow traffic on port 1433 only from the Azure VPN subnet, you can securely allow users to connect to the SQL Server without exposing it to the public internet. This setup ensures that only authenticated VPN users can access the SQL Server, maintaining security while providing necessary access.
Reference document: https://learn.microsoft.com/en-us/azure/virtual-network/manage-network-security-group?tabs=network-security-group-portal
When users connect to the Azure VPN via the Point-to-Site (P2S) configuration, they are assigned IPs from a VPN address pool (usually something like 172.16.0.0/24
).
You can find or configure this in:
Azure Portal → Virtual Network Gateway → Point-to-site configuration → Address pool
Reference document: https://techcommunity.microsoft.com/blog/itopstalkblog/step-by-step-creating-an-azure-point-to-site-vpn/326264
**Authentications:
**Please be informed that Azure SQL server doesn't support Windows authentication. It will work for SQL managed instance.
Microsoft Entra ID supports azure sql server to connect.
But it depends on how you configured the server. If you have selected both SQL and Microsoft Entra authentication, then it will work as shown below,
If you select only sql authentication, then you can to set your current Azure AD user as the Azure SQL Admin for your database. Follow the steps below:
Navigate to Your Azure SQL Server:
- Log in to the Azure Portal.
Search for and select your Azure SQL Server.
- Set Azure AD Admin:
- In the left-hand menu, under Settings, click on Microsoft Entra ID.
- Select Support Only Microsoft Entra authentication for this server to ensures no one can access the database server using SQL login credentials.
- Click on Set admin.Copy
- In the Add admin pane, search for your user account.
- Click on Set admin.Copy
- Select your account and click Select.
- This will set your user as a database admin and allow it to login using Microsoft Entra authentication. - Click on **Save**.
Note: Make sure you uncheck that box, as this will disable the SQL authentication.
Reference document: https://learn.microsoft.com/en-us/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm?view=azuresql&tabs=azure-portal
https://learn.microsoft.com/en-us/azure/azure-sql/database/authentication-aad-overview?view=azuresql