Skip to content

Commit b764da5

Browse files
committed
Bringing even with master.
2 parents 78cf6c8 + 8bb2116 commit b764da5

8 files changed

Lines changed: 39 additions & 29 deletions

File tree

docs/connect/homepage-sql-connection-programming.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Homepage for SQL client programming | Microsoft Docs"
33
description: "Hub page with annotated links to downloads and documentation for numerous combinations of languages and operating systems, for connecting to SQL Server or to Azure SQL Database."
44
author: "MightyPen"
5-
ms.date: "11/29/2017"
5+
ms.date: "04/16/2018"
66
ms.prod: "sql"
77
ms.prod_service: "drivers"
88
ms.service: ""

docs/docfx.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,16 @@
5656

5757
"monikerRange": {
5858

59+
"ado/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
60+
"connect/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
61+
"data-quality-services/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
62+
"dma/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
63+
"master-data-services/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
64+
"odbc/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
65+
"reporting-services/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
66+
"sql-operations-studio/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
67+
"ssma/**/*.md": ">= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
68+
5969
"advanced-analytics/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions",
6070
"analysis-services/**/*.md": ">= sql-analysis-services-2016 || = sqlallproducts-allversions",
6171
"analytics-platform-system/**/*.md": ">= aps-pdw-2016 || = sqlallproducts-allversions",
@@ -66,11 +76,10 @@
6676
"mdx/**/*.md": ">= sql-analysis-services-2016 || = sqlallproducts-allversions",
6777
"powershell/**/*.md": ">= aps-pdw-2016 || = azure-sqldw-latest || = azuresqldb-current || >= sql-server-2016 || = sqlallproducts-allversions",
6878
"relational-databases/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions",
69-
"reporting-services/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions",
7079
"samples/**/*.md": "= azuresqldb-current || >= sql-server-2016 || = sqlallproducts-allversions",
71-
"ssdt/**/*.md": ">= ssdt-15vs2017 || = sqlallproducts-allversions",
72-
"ssms/**/*.md": ">= aps-pdw-2016 || = azure-sqldw-latest || = azuresqldb-current || >= sql-server-2016 || = sqlallproducts-allversions",
7380
"sql-server/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions",
81+
"ssdt/**/*.md": ">= ssdt-15vs2017 || >= sql-server-2016 || >= sql-server-linux-2017 || = azuresqldb-current || = azuresqldb-mi-current || = azure-sqldw-latest || >= aps-pdw-2016 || = sqlallproducts-allversions",
82+
"ssms/**/*.md": ">= aps-pdw-2016 || = azure-sqldw-latest || = azuresqldb-current || >= sql-server-2016 || = sqlallproducts-allversions",
7483
"tools/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions",
7584
"t-sql/**/*.md": "= azuresqldb-current || >= sql-server-2016 || = sqlallproducts-allversions",
7685
"xquery/**/*.md": ">= sql-server-2016 || = sqlallproducts-allversions"

docs/relational-databases/import-export/reporting-import-flat-file-failures.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ monikerRange: "= azuresqldb-current || >= sql-server-2016 || = sqlallproducts-al
2222
---
2323
# Reporting Import Flat File failures
2424

25-
The [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/) in SSMS is powered by the Microsoft PROSE SDK, which is a framework for automatic programming or data wrangling from input-output examples. Although the Wizard can convert most Flat File sources, the PROSE team will consider updates to their algorithm based on any failures you experience.
25+
The [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/) in SSMS is powered by the [Microsoft PROSE SDK](https://microsoft.github.io/prose/), which is a framework for automatic programming or data wrangling from input-output examples. Although the Wizard can convert most Flat File sources, the PROSE team will consider updates to their algorithm based on any failures you experience.
2626

2727
## Send an email
2828

2929
If you run into an import failure or have a suggestion for feature improvement, send an email to sqltoolsprosesupport@microsoft.com
3030

3131
In this email:
3232
- Include which version of SSMS you are running (**Help** -> **About**)
33-
- Attach a snippet/sample of your flat file (**Do not include any Personal identifiable information (PII)**)
33+
- Attach a snippet/sample of your flat file, say the first few lines including column names (**Do not include any Personal identifiable information (PII)**)
3434
- Brief description of the error you are running into and how you would like it to behave
3535

3636
Sending this sample helps improve the Import Flat File Wizard experience since this information is directly sent to the PROSE team. Thank you for your help.
@@ -39,5 +39,5 @@ Sending this sample helps improve the Import Flat File Wizard experience since t
3939

4040
Learn more about the wizard.
4141

42-
- **Learn more about the Import Flat File Wizard** If you are looking for an overview of the Import Flat File wizard, see [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/).
42+
- **Learn more about the Import Flat File Wizard.** If you are looking for an overview of the Import Flat File wizard, see [Import Flat File Wizard](https://docs.microsoft.com/en-us/sql/relational-databases/import-export/import-flat-file-wizard/).
4343
- **Learn more about PROSE.** If you are looking for an overview of the intelligent framework used by this wizard, see [PROSE SDK](https://microsoft.github.io/prose/).

docs/relational-databases/security/encryption/transparent-data-encryption-azure-sql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ Microsoft also seamlessly moves and manages the keys as needed for geo-replicati
4242
> All newly created SQL databases are encrypted by default by using service-managed transparent data encryption. Existing databases before May 2017 and databases created through restore, geo-replication, and database copy aren't encrypted by default.
4343
>
4444
45-
## Bring Your Own Key (preview)
45+
## Bring Your Own Key
4646

47-
With Bring Your Own Key (in preview) support, you can take control over your transparent data encryption keys and control who can access them and when. Key Vault, which is the Azure cloud-based external key management system, is the first key management service that transparent data encryption has integrated with Bring Your Own Key support. With Bring Your Own Key support, the database encryption key is protected by an asymmetric key stored in Key Vault. The asymmetric key never leaves Key Vault. After the server has permissions to a key vault, the server sends basic key operation requests to it through Key Vault. You set the asymmetric key at the server level, and all databases under that server inherit it.
47+
With Bring Your Own Key support, you can take control over your transparent data encryption keys and control who can access them and when. Key Vault, which is the Azure cloud-based external key management system, is the first key management service that transparent data encryption has integrated with Bring Your Own Key support. With Bring Your Own Key support, the database encryption key is protected by an asymmetric key stored in Key Vault. The asymmetric key never leaves Key Vault. After the server has permissions to a key vault, the server sends basic key operation requests to it through Key Vault. You set the asymmetric key at the server level, and all databases under that server inherit it.
4848

4949
With Bring Your Own Key support, you now can control key management tasks such as key rotations and key vault permissions. You also can delete keys and enable auditing/reporting on all encryption keys. Key Vault provides central key management and uses tightly monitored hardware security modules. Key Vault promotes separation of management of keys and data to help meet regulatory compliance. To learn more about Key Vault, see the [Key Vault documentation page](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault).
5050

docs/relational-databases/security/encryption/transparent-data-encryption-byok-azure-sql-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ ms.author: "aliceku"
2121
monikerRange: "= azuresqldb-current || = azure-sqldw-latest || = sqlallproducts-allversions"
2222
---
2323

24-
# PowerShell and CLI: Enable Transparent Data Encryption using your own key from Azure Key Vault (Preview)
24+
# PowerShell and CLI: Enable Transparent Data Encryption using your own key from Azure Key Vault
2525

2626
[!INCLUDE[appliesto-xx-asdb-asdw-xxx-md](../../../includes/appliesto-xx-asdb-asdw-xxx-md.md)]
2727

28-
This how-to guide walks through how to use a key from Azure Key Vault for Transparent Data Encryption (TDE) (in preview) on a SQL Database or Data Warehouse. To learn more about the TDE with Bring Your Own Key (BYOK) Support (in preview), visit [TDE Bring Your Own Key to Azure SQL](transparent-data-encryption-byok-azure-sql.md).
28+
This how-to guide walks through how to use a key from Azure Key Vault for Transparent Data Encryption (TDE) on a SQL Database or Data Warehouse. To learn more about the TDE with Bring Your Own Key (BYOK) Support, visit [TDE Bring Your Own Key to Azure SQL](transparent-data-encryption-byok-azure-sql.md).
2929

3030
## Prerequisites for PowerShell
3131

docs/relational-databases/security/encryption/transparent-data-encryption-byok-azure-sql.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ ms.workload: "On Demand"
1717
ms.tgt_pltfrm: ""
1818

1919
ms.topic: "article"
20-
ms.date: "04/03/2018"
20+
ms.date: "04/16/2018"
2121
ms.author: "aliceku"
2222
monikerRange: "= azuresqldb-current || = azure-sqldw-latest || = sqlallproducts-allversions"
2323
---
24-
# Transparent Data Encryption with Bring Your Own Key (PREVIEW) support for Azure SQL Database and Data Warehouse
24+
# Transparent Data Encryption with Bring Your Own Key support for Azure SQL Database and Data Warehouse
2525
[!INCLUDE[appliesto-xx-asdb-asdw-xxx-md](../../../includes/appliesto-xx-asdb-asdw-xxx-md.md)]
2626

2727
Bring Your Own Key (BYOK) support for [Transparent Data Encryption (TDE)](transparent-data-encryption.md) allows you to encrypt the Database Encryption Key (DEK) with an asymmetric key called TDE Protector. The TDE Protector is stored under your control in [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), Azure’s cloud-based external key management system. Azure Key Vault is the first key management service with which TDE has integrated support for BYOK. The TDE DEK, which is stored on the boot page of a database is encrypted and decrypted by the TDE protector. The TDE Protector is stored in Azure Key Vault and never leaves the key vault. If the server's access to the key vault is revoked, a database cannot be decrypted and read into memory. The TDE protector is set at the logical server level and is inherited by all databases associated with that server.
@@ -120,7 +120,8 @@ The following section will go over the setup and configuration steps in more det
120120
### Azure Key Vault Configuration Steps
121121

122122
- Install [PowerShell](https://docs.microsoft.com/en-us/powershell/azure/install-azurerm-ps?view=azurermps-5.6.0)
123-
- Create two Azure Key Vaults in two different regions using [PowerShell to enable the “soft-delete” property](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-soft-delete-powershell) on the key vaults (this option is not available from the AKV Portal yet – but required by SQL)
123+
- Create two Azure Key Vaults in two different regions using [PowerShell to enable the “soft-delete” property](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-soft-delete-powershell) on the key vaults (this option is not available from the AKV Portal yet – but required by SQL).
124+
- Both Azure Key Vaults must be located in the two regions available in the same Azure Geo in order for backup and restore of keys to work. If you need the two key vaults to be located in different geos to meet SQL Geo-DR requirements, follow the [BYOK Process](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-hsm-protected-keys) that allows keys to be imported from an on-prem HSM.
124125
- Create a new key in the first key vault:
125126
- RSA/RSA-HSA 2048 key
126127
- No expiration dates

docs/sql-server/stretch-database/stretch-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ ms.workload: "On Demand"
4545
Enjoy peace of mind as you stretch your most important applications securely to the cloud. SQL Server’s Always Encrypted provides encryption for your data in motion. Row Level Security (RLS) and other advanced SQL Server security features also work with Stretch Database to protect your data.
4646

4747
## What does Stretch Database do?
48-
After you enable Stretch Database for a SQL Server instance, a database, and at least one table, Stretch Database silently begins to migrate your cold data to Azure.
48+
After you enable Stretch Database for a SQL Server instance, a database, and select at least one table, Stretch Database silently begins to migrate your cold data to Azure.
4949

5050
- If you store cold data in a separate table, you can migrate the entire table.
5151

docs/t-sql/functions/certproperty-transact-sql.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -47,42 +47,42 @@ CertProperty ( Cert_ID , '<PropertyName>' )
4747

4848
## Arguments
4949
*Cert_ID*
50-
Is the ID of the certificate. *Cert_ID* is an int.
50+
The certificate ID value, of data type int.
5151

5252
*Expiry_Date*
53-
Is the date of expiration of the certificate.
53+
The certificate expiration date.
5454

5555
*Start_Date*
56-
Is the date when the certificate becomes valid.
56+
The date when the certificate becomes valid.
5757

5858
*Issuer_Name*
59-
Is the issuer name of the certificate.
59+
The name of the certificate issuer.
6060

6161
*Cert_Serial_Number*
62-
Is the certificate serial number.
62+
The certificate serial number.
6363

6464
*Subject*
65-
Is the subject of the certificate.
65+
The certificate subject.
6666

6767
*SID*
68-
Is the SID of the certificate. This is also the SID of any login or user mapped to this certificate.
68+
The certificate SID. This is also the SID of any login or user mapped to this certificate.
6969

7070
*String_SID*
71-
Is the SID of the certificate as a character string. This is also the SID of any login or user mapped to the certificate.
71+
The SID of the certificate as a character string. This is also the SID of any login or user mapped to the certificate.
7272

7373
## Return types
74-
The property specification must be enclosed in single quotation marks.
74+
Single quotation marks must enclose the property specification.
7575

76-
The return type depends on the property that is specified in the function call. All return values are wrapped in the return type of **sql_variant**.
76+
The return type depends on the property specified in the function call. The return type **sql_variant** wraps all return values.
7777
- *Expiry_Date* and *Start_Date* return **datetime**.
78-
- *Cert_Serial_Number*, *Issuer_Name*, *Subject*, and *String_SID* return **nvarchar**.
78+
- *Cert_Serial_Number*, *Issuer_Name*, *String_SID*, and *Subject* all return **nvarchar**.
7979
- *SID* returns **varbinary**.
8080

8181
## Remarks
82-
Information about certificates is visible in the [sys.certificates](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md) catalog view.
82+
See certificate information in the [sys.certificates](../../relational-databases/system-catalog-views/sys-certificates-transact-sql.md) catalog view.
8383

8484
## Permissions
85-
Requires some permission on the certificate and that the caller has not been denied VIEW DEFINITION permission on the certificate.
85+
Requires appropriate permission(s) on the certificate, and requires that the caller has not been denied VIEW permission on the certificate. See [CREATE CERTIFICATE &#40;Transact-SQL&#41;](../../t-sql/statements/create-certificate-transact-sql.md) and [GRANT CERTIFICATE PERMISSIONS &#40;Transact-SQL&#41;](../../t-sql/statements/grant-certificate-permissions-transact-sql.md) for more information about certificate permissions.
8686

8787
## Examples
8888
The following example returns the certificate subject.
@@ -91,7 +91,7 @@ The following example returns the certificate subject.
9191
-- First create a certificate.
9292
CREATE CERTIFICATE Marketing19 WITH
9393
START_DATE = '04/04/2004' ,
94-
EXPIRY_DATE = '07/07/2007' ,
94+
EXPIRY_DATE = '07/07/2040' ,
9595
SUBJECT = 'Marketing Print Division';
9696
GO
9797

0 commit comments

Comments
 (0)