Hanzo
PlatformHanzo KMSPlatformDynamic Secrets

Azure SQL Database

Learn how to dynamically generate Azure SQL Database user credentials.

The Hanzo KMS Azure SQL Database dynamic secret allows you to generate Azure SQL Database user credentials on demand based on configured roles.

How Azure SQL Database Authentication Works

Azure SQL Database uses a two-tier authentication system that differs from traditional SQL Server:

  1. Master Database: Contains server-level logins that can authenticate to the Azure SQL Database server
  2. User Databases: Individual databases that contain database users mapped to server logins

When creating dynamic credentials for Azure SQL Database, Hanzo KMS performs a two-step process:

  1. Create Login in Master Database: Creates a server-level login with the specified password
  2. Create User in Target Database: Creates a database user mapped to the login and grants the necessary permissions

This architecture ensures proper security isolation and follows Azure SQL Database best practices.

Prerequisite

Create a user with the required permissions in your Azure SQL Database instance. This user will be used to create new accounts on-demand.

The user needs:

  • loginmanager role in the master database (to create logins)
  • db_owner role in the target database (to create users and grant permissions)

Set up Dynamic Secrets with Azure SQL Database

Open the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret.

Add Dynamic Secret Button

Dynamic Secret Modal

Name by which you want the secret to be referenced

Default time-to-live for a generated secret (it is possible to modify this value after a secret is generated)

Maximum time-to-live for a generated secret

List of key/value metadata pairs

Azure SQL Database server hostname (e.g., myserver.database.windows.net)

Database port (typically 1433 for Azure SQL Database)

Username that will be used to create dynamic secrets (must have loginmanager role in master and db_owner in target database)

Password that will be used to create dynamic secrets

Name of the target database where users will be created and granted permissions

Enable SSL encryption for the database connection (recommended for Azure SQL Database)

SSL certificate authority certificate. For Azure SQL Database, this is typically not required as Azure manages the certificates.

Dynamic Secret Setup Modal

Modify SQL Statements Modal

Azure SQL Database dynamic secrets use predefined SQL statements that follow Azure's security best practices:

SQL statement executed in the master database to create a server-level login. This login allows authentication to the Azure SQL Database server.

SQL statement executed in the target database to create a database user and grant permissions. The user is mapped to the login created in the master database.

SQL statements executed when a lease expires or is manually revoked. The system intelligently routes DROP USER commands to the target database and DROP LOGIN commands to the master database for proper cleanup.

After submitting the form, you will see a dynamic secret created in the dashboard.

If this step fails, ensure your user has the proper permissions in both the master database (loginmanager role) and target database (db_owner role).

Dynamic Secret

Once you've successfully configured the dynamic secret, you're ready to generate on-demand credentials. To do this, simply click on the 'Generate' button which appears when hovering over the dynamic secret item. Alternatively, you can initiate the creation of a new lease by selecting 'New Lease' from the dynamic secret lease list section.

Dynamic Secret Dynamic Secret

When generating these secrets, it's important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for.

Provision Lease

Ensure that the TTL for the lease falls within the maximum TTL defined when configuring the dynamic secret.

Once you click the Submit button, a new secret lease will be generated and the credentials for it will be shown to you.

Provision Lease

Audit or Revoke Leases

Once you have created one or more leases, you will be able to access them by clicking on the respective dynamic secret item on the dashboard. This will allow you to see the expiration time of the lease or delete the lease before its set time to live.

When a lease is revoked or expires, Hanzo KMS automatically:

  1. Drops the user from the target database
  2. Drops the login from the master database

This ensures complete cleanup and prevents orphaned credentials.

Provision Lease

Renew Leases

To extend the life of the generated dynamic secret leases past its initial time to live, simply click on the Renew button as illustrated below. Provision Lease

Lease renewals cannot exceed the maximum TTL set when configuring the dynamic secret

How is this guide?

Last updated on

On this page