12
Plus, with auditing and threat detection features, you can monitor activities
and use Row-Level Security and Dynamic Data Masking to control access to
sensitive and privileged data. You can also use firewall rules at the database and
server levels to specify a range of IPs that can access the instance. Likewise, you
can manage virtual network rules using firewalls.
Figure 3: Optimizing security with Azure Active Directory
SQL
SQL
SQL
Figure 4: Optimizing security with Azure Active Directory
VNET
On-premises
Active Directory Federation Services
Azure AD
Existing
AD
Existing
domain user
Authentication
Subnet 1 Web app
(public IP)
SQL
Server
Instance
#1
SQL
Server
Instance
#2
SQL
Server
Instance
#3
Subnet 2
How do I approach migration? Chapter 05