Unable to authenticate with Azure AD credentails in Azure SQL Database using private endpoint/links
I have a SQL database that is being used to store data pushed from D365 and needs to be accessed from AWS.
The requirement is as follows:
a. The access to the Azure SQL database should be using the internal network using private endpoints/links.
b. The user/identity should authenticate using Azure AD credentials and not using the (native) SQL user.
I tried this from my end but it results as follows:
- AD user authentication does not work if the SQL database url points to a Private IP address.
- AD user authentication works only if the SQL database url points to a Public IP address.
The SQL database has not been added to a VNET enabling service endpoints as this might block the connections from D365 ?
Can anyone explain what is the reason behind the behavior for the above 2 scenarios ?
And is there a way to provide a solution that satisfies both the requirements (a and b) ?