Skip to content

Commit 1057c42

Browse files
authored
Merge pull request #30379 from MikeRayMSFT/240415-least-privilege-update
Add note for least privilege to become default
2 parents 7c87060 + 42e5d73 commit 1057c42

6 files changed

Lines changed: 22 additions & 1 deletion

File tree

docs/sql-server/azure-arc/agent-extension-files.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,9 @@ This article lists the files and the registry keys created by the installation o
3434
| `C:\Windows\ServiceProfiles\SqlServerExtension\AppData\Local\Microsoft SQL Server Extension Agent\*` | When configured for [least privilege](configure-least-privilege.md) <br/><br/> Feature application |
3535
| `C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft SQL Server Extension Agent\*`| When not configured for [least privilege](configure-least-privilege.md) <br/></br> Feature application |
3636

37+
> [!NOTE]
38+
> [!INCLUDE [least-privilege-default](includes/least-privilege-default.md)]
39+
3740
## Registry keys
3841

3942
Base key: `HKEY_LOCAL_MACHINE`

docs/sql-server/azure-arc/backup-local.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,9 @@ If both database and instance level backup schedule is set, database level sched
6262

6363
The backup service within the Azure extension for Arc-enabled SQL Server uses [NT AUTHORITY\SYSTEM] account to perform the backups. If you're [operating SQL Server enabled by Arc with least privilege](configure-least-privilege.md), A local Windows account - [NT Service\SQLServerExtension] - performs the backup.
6464

65+
> [!NOTE]
66+
> [!INCLUDE [least-privilege-default](includes/least-privilege-default.md)]
67+
6568
If you use Azure extension for SQL Server [version 1.1.2504.99](release-notes.md#november-14-2023) or later, the necessary permissions are granted to [NT AUTHORITY\SYSTEM] automatically. You don't need to assign permissions manually.
6669

6770
**For earlier extensions only**, follow the below steps to assign permission to [NT AUTHORITY\SYSTEM] account.

docs/sql-server/azure-arc/configure-least-privilege.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ To optionally configure the service to run with least privilege, follow the step
2121

2222
[Configure Windows service accounts and permissions for Azure Extension for SQL Server](configure-windows-accounts-agent.md) describes the least privilege permissions for the agent extension service.
2323

24+
> [!NOTE]
25+
> [!INCLUDE [least-privilege-default](includes/least-privilege-default.md)]
26+
2427
Support for this configuration is currently available for preview.
2528

2629
[!INCLUDE [azure-arc-sql-preview](includes/azure-arc-sql-preview.md)]

docs/sql-server/azure-arc/configure-windows-accounts-agent.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ ms.topic: reference
1414

1515
This article lists the permissions Azure extension for SQL Server sets on an instance of for the `NT Service\SQLServerExtension` account. This account is used when you [Operate SQL Server enabled by Azure Arc with least privilege (preview)](configure-least-privilege.md).
1616

17+
> [!NOTE]
18+
> [!INCLUDE [least-privilege-default](includes/least-privilege-default.md)]
19+
1720
Manually setting the permissions for the agent account is not supported.
1821

1922
The extension sets permissions when you enable features on the Azure portal. If you don't enable a feature, the extension does not set the permissions for that feature. If you disable a feature, the extension removes the permissions.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
author: MikeRayMSFT
3+
ms.service: azure-arc
4+
ms.topic: include
5+
ms.date: 04/16/2024
6+
ms.author: mikeray
7+
---
8+
9+
If the Azure Extension is version `1.1.2594.118` (February 2024 release) or later, then the least privileges mode will become the default mode in the coming months.

docs/sql-server/azure-arc/troubleshoot-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The server principal isn't able to access the database under the current securit
8080

8181
Ensure the SQL Server built-in login NT AUTHORITY\SYSTEM is a member of the SQL Server sysadmin server role for all the SQL Server instances running on the machine.
8282

83-
If this isn't allowed, you can configure a least privilege account for the Azure extension for SQL Server service on your SQL Server machine. Least Privilege account is available for preview.
83+
If this isn't allowed, you can configure a least privilege account for the Azure extension for SQL Server service on your SQL Server machine. Least privilege account is available for preview.
8484

8585
To configure your server, follow the steps in [Operate SQL Server enabled by Azure Arc with least privilege (preview)](configure-least-privilege.md).
8686

0 commit comments

Comments
 (0)