Skip to content

Commit 694c090

Browse files
authored
Fixes in-flight export of PostgreSql Azure#2744 (Azure#2745)
1 parent 2ee41d7 commit 694c090

File tree

3 files changed

+110
-42
lines changed

3 files changed

+110
-42
lines changed

docs/CHANGELOG-v1.md

+6
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,12 @@ See [upgrade notes][1] for helpful information when upgrading from previous vers
3232

3333
## Unreleased
3434

35+
What's changed since v1.34.1:
36+
37+
- Bug fixes:
38+
- Fixed export of in-flight data for flexible PostgreSQL servers by @BernieWhite.
39+
[#2744](https://github.com/Azure/PSRule.Rules.Azure/issues/2744)
40+
3541
## v1.34.1
3642

3743
What's changed since v1.34.0:

docs/en/rules/Azure.PostgreSQL.AAD.md

+29-25
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,23 @@
11
---
2+
reviewed: 2024-03-09
23
severity: Critical
34
pillar: Security
4-
category: Authentication
5+
category: SE:05 Identity and access management
56
resource: Azure Database for PostgreSQL
67
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.PostgreSQL.AAD/
78
---
89

9-
# Use AAD authentication with PostgreSQL databases
10+
# Use Entra ID authentication with PostgreSQL databases
1011

1112
## SYNOPSIS
1213

13-
Use Azure Active Directory (AAD) authentication with Azure Database for PostgreSQL databases.
14+
Use Entra ID authentication with Azure Database for PostgreSQL databases.
1415

1516
## DESCRIPTION
1617

17-
Azure Database for PostgreSQL offer two authentication models, Azure Active Directory (AAD) and PostgreSQL logins.
18-
AAD authentication supports centialized identity management in addition to modern password protections.
19-
Some of the benefits of AAD authentication over PostgreSQL authentication including:
18+
Azure Database for PostgreSQL offer two authentication models, Entra ID (previously knows as Azure AD) and PostgreSQL logins.
19+
Entra ID authentication supports centralized identity management in addition to modern password protections.
20+
Some of the benefits of Entra ID authentication over PostgreSQL authentication including:
2021

2122
- Support for Azure Multi-Factor Authentication (MFA).
2223
- Conditional-based access with Conditional Access.
@@ -25,7 +26,7 @@ It is also possible to disable PostgreSQL authentication entirely for the flexib
2526

2627
## RECOMMENDATION
2728

28-
Consider using Azure Active Directory (AAD) authentication with Azure Database for PostgreSQL databases.
29+
Consider using Entra ID authentication with Azure Database for PostgreSQL databases.
2930
Additionally, consider disabling PostgreSQL authentication.
3031

3132
## EXAMPLES
@@ -35,9 +36,9 @@ Additionally, consider disabling PostgreSQL authentication.
3536
To deploy Azure Database for PostgreSQL flexible servers that pass this rule:
3637

3738
- Configure the `Microsoft.DBforPostgreSQL/flexibleServers/administrators` sub-resource.
38-
- Set the `properties.principalName` to the user principal name of the AAD administrator user, group, or application.
39-
- Set the `properties.principalType` to the principal type used to represent the type of AAD administrator.
40-
- Set the `properties.tenantId` to the tenant ID of the AAD administrator user, group, or application.
39+
- Set the `properties.principalName` to the user principal name of the Entra ID administrator user, group, or application.
40+
- Set the `properties.principalType` to the principal type used to represent the type of Entra ID administrator.
41+
- Set the `properties.tenantId` to the tenant ID of the Entra ID administrator user, group, or application.
4142

4243
For example:
4344

@@ -61,9 +62,9 @@ To deploy Azure Database for PostgreSQL single servers that pass this rule:
6162

6263
- Configure the `Microsoft.DBforPostgreSQL/servers/administrators` sub-resource.
6364
- Set the `properties.administratorType` to `ActiveDirectory`.
64-
- Set the `properties.login` to the AAD administrator login object name.
65-
- Set the `properties.sid` to the object ID GUID of the AAD administrator user, group, or application.
66-
- Set the `properties.tenantId` to the tenant ID of the AAD administrator user, group, or application.
65+
- Set the `properties.login` to the Entra ID administrator login object name.
66+
- Set the `properties.sid` to the object ID GUID of the Entra ID administrator user, group, or application.
67+
- Set the `properties.tenantId` to the tenant ID of the Entra ID administrator user, group, or application.
6768

6869
For example:
6970

@@ -89,9 +90,9 @@ For example:
8990
To deploy Azure Database for PostgreSQL flexible servers that pass this rule:
9091

9192
- Configure the `Microsoft.DBforPostgreSQL/flexibleServers/administrators` sub-resource.
92-
- Set the `properties.principalName` to the user principal name of the AAD administrator user, group, or application.
93-
- Set the `properties.principalType` to the principal type used to represent the type of AAD administrator.
94-
- Set the `properties.tenantId` to the tenant ID of the AAD administrator user, group, or application.
93+
- Set the `properties.principalName` to the user principal name of the Entra ID administrator user, group, or application.
94+
- Set the `properties.principalType` to the principal type used to represent the type of Entra ID administrator.
95+
- Set the `properties.tenantId` to the tenant ID of the Entra ID administrator user, group, or application.
9596

9697
For example:
9798

@@ -111,9 +112,9 @@ To deploy Azure Database for PostgreSQL single servers that pass this rule:
111112

112113
- Configure the `Microsoft.DBforPostgreSQL/servers/administrators` sub-resource.
113114
- Set the `properties.administratorType` to `ActiveDirectory`.
114-
- Set the `properties.login` to the AAD administrator login object name.
115-
- Set the `properties.sid` to the object ID GUID of the AAD administrator user, group, or application.
116-
- Set the `properties.tenantId` to the tenant ID of the AAD administrator user, group, or application.
115+
- Set the `properties.login` to the Entra ID administrator login object name.
116+
- Set the `properties.sid` to the object ID GUID of the Entra ID administrator user, group, or application.
117+
- Set the `properties.tenantId` to the tenant ID of the Entra ID administrator user, group, or application.
117118

118119
For example:
119120

@@ -132,15 +133,18 @@ resource aadAdmin 'Microsoft.DBforPostgreSQL/servers/administrators@2017-12-01'
132133

133134
## NOTES
134135

135-
The single server deployment model is limited to only one Azure AD admin at a time and does not support enforcing AAD-authentication only.
136+
The single server deployment model is limited to:
137+
138+
- Only one Azure AD admin at a time.
139+
- Does not support enforcing Entra ID authentication only.
136140

137141
## LINKS
138142

139-
- [Use modern password protection](https://learn.microsoft.com/azure/architecture/framework/security/design-identity-authentication#use-modern-password-protection)
140-
- [Azure Active Directory Authentication with PostgreSQL Flexible Server](https://learn.microsoft.com/azure/postgresql/flexible-server/concepts-azure-ad-authentication#how-azure-ad-works-in-flexible-server)
141-
- [Use Azure AD for authentication with Azure Database for PostgreSQL - Flexible Server](https://learn.microsoft.com/azure/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication)
142-
- [Use Azure AD for authentication with Azure Database for PostgreSQL - Single Server](https://learn.microsoft.com/azure/postgresql/single-server/how-to-configure-sign-in-azure-ad-authentication)
143-
- [Azure Active Directory Authentication (Single Server VS Flexible Server)](https://learn.microsoft.com/azure/postgresql/flexible-server/concepts-azure-ad-authentication#azure-active-directory-authentication-single-server-vs-flexible-server)
143+
- [SE:05 Identity and access management](https://learn.microsoft.com/azure/well-architected/security/identity-access)
144+
- [How Microsoft Entra ID Works in Azure Database for PostgreSQL flexible server](https://learn.microsoft.com/azure/postgresql/flexible-server/concepts-azure-ad-authentication#how-azure-ad-works-in-flexible-server)
145+
- [Use Microsoft Entra ID for authentication with Azure Database for PostgreSQL - Flexible Server](https://learn.microsoft.com/azure/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication)
146+
- [Use Microsoft Entra ID for authentication with PostgreSQL](https://learn.microsoft.com/azure/postgresql/single-server/how-to-configure-sign-in-azure-ad-authentication)
147+
- [Microsoft Entra authentication (Azure Database for PostgreSQL single Server vs Azure Database for PostgreSQL flexible server)](https://learn.microsoft.com/azure/postgresql/flexible-server/concepts-azure-ad-authentication#azure-active-directory-authentication-single-server-vs-flexible-server)
144148
- [Azure security baseline for Azure Database for PostgreSQL - Flexible Server](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-database-for-postgresql-flexible-server-security-baseline)
145149
- [Azure security baseline for Azure Database for PostgreSQL - Single Server](https://learn.microsoft.com/security/benchmark/azure/baselines/postgresql-security-baseline)
146150
- [IM-1: Use centralized identity and authentication system](https://learn.microsoft.com/security/benchmark/azure/baselines/azure-database-for-postgresql-flexible-server-security-baseline#im-1-use-centralized-identity-and-authentication-system)

0 commit comments

Comments
 (0)