Skip to main content

Connect to Azure SQL database using managed identity C# .Net 6.0

Connect to Azure SQL database using managed identity C# .Net 6.0

Let's discuss the connecting .net 6.0 c# application to azure SQL serve using MSI

.NET 6.0 applications are more flexible and require less work than other.NET frameworks, such as.NET Core 3.1,.NET 4.8, and so on.

Connect  .Net Core 3.1 or the Lower version Application to azure SQL

  you will be using the following package

Install-Package Azure.Identity

Install-Package System.Data.SqlClient


Connect .Net 6.0 Application to Azure SQL: 

you will be using only following the NuGet package with the new connection string

dotnet add package Microsoft.Data.SqlClient


 if you are using system-assigned identity MSI then uses the following connections string and code.(Local Machine)

using Microsoft.Data.SqlClient;

...

// Uncomment one of the two lines depending on the identity type    
SqlConnection connection = new SqlConnection(
    "Server=tcp:<server-name>.database.windows.net;Database=<database-name>;
Authentication=Active Directory Default;TrustServerCertificate=True"
    ); // system-assigned identity
// Open the SQL connection
connection.Open();



If you are using a user-assigned identity then use the following connecting string or code (Local Machine)


using Microsoft.Data.SqlClient;

...

SqlConnection connection = new SqlConnection(
    "Server=tcp:<server-name>.database.windows.net;Database=<database-name>;
Authentication=Active Directory Default;
User Id=<client-id-of-user-assigned-identity>;TrustServerCertificate=True");
    // user-assigned identity

// Open the SQL connection
connection.Open();

Set up your dev environment and Visual Studio

  • Visual Studio for Windows is integrated with Azure AD authentication. To enable development and debugging in Visual Studio, add your Azure AD user in Visual Studio by selecting File > Account Settings from the menu, and selecting Sign-in or Add.
  • To set the Azure AD user for Azure service authentication, select Tools > Options from the menu, then select Azure Service Authentication > Account Selection. Select the Azure AD user you added and select OK


To run your application on Azure App Service, you may need to use the connection string below


Since Microsoft.Data.SqlClient 2.1.0, the driver supports authentication to Azure SQL Database, and Azure SQL Managed Instance by acquiring access tokens via managed identity. To use this authentication, specify either Active Directory Managed Identity or Active Directory MSI in the connection string, and no password is required. You can't set the Credential property of SqlConnection in this mode either.

Below connection string for system-assigned identity :

// For system-assigned managed identity
// Use your own server and database.
string ConnectionString1 = @"Server=demo.database.windows.net;
Authentication=Active Directory Managed Identity; Database=employeedb";

using (SqlConnection conn = new SqlConnection(ConnectionString1)) {
    conn.Open();
}

string ConnectionString2 = @"Server=demo.database.windows.net;
Authentication=Active Directory MSI; Database=employeedb";

using (SqlConnection conn = new SqlConnection(ConnectionString2)) {
    conn.Open();
}

For the other pre-steps of SQL server configuration, see here

Comments

Popular posts from this blog

How to Make a Custom URL Shortener Using C# and .Net Core 3.1

C# and .Net Core 3.1:  Make a Custom URL Shortener Since a Random URL needs to be random and the intent is to generate short URLs that do not span more than 7 - 15 characters, the real thing is to make these short URLs random in real life too and not just a string that is used in the URLs Here is a simple clean approach to develop custom solutions Prerequisite:  Following are used in the demo.  VS CODE/VISUAL STUDIO 2019 or any Create one .Net Core Console Applications Install-Package Microsoft.AspNetCore -Version 2.2.0 Add a class file named ShortLink.cs and put this code: here we are creating two extension methods. public   static   class   ShortLink {      public   static   string   GetUrlChunk ( this   long   key ) =>            WebEncoders . Base64UrlEncode ( BitConverter . GetBytes ( key ));      public   static   long   GetKeyFromUrl ( this   string   urlChunk ) =>            BitConverter . ToInt64 ( WebEncoders . Base64UrlDecode ( urlChunk )); } Here is the Calling Sampl

Azure key vault with .net framework 4.8

Azure Key Vault  With .Net Framework 4.8 I was asked to migrate asp.net MVC 5 web application to Azure and I were looking for the key vault integrations and access all the secrete out from there. Azure Key Vault Config Builder Configuration builders for ASP.NET  are new in .NET Framework >=4.7.1 and .NET Core >=2.0 and allow for pulling settings from one or many sources. Config builders support a number of different sources like user secrets, environment variables and Azure Key Vault and also you can create your own config builder, to pull in configuration from your own configuration management system. Here I am going to demo Key Vault integrations with Asp.net MVC(download .net framework 4.8). You will find that it's magical, without code, changes how your app can read secretes from the key vault. Just you have to do the few configurations in your web config file. Prerequisite: Following resource are required to run/complete this demo ·         A