2022 Archive

An archive of changes made to the Data Bridge API in 2022.

Data Bridge, December 2022

The December 2022 release of the Data Bridge API introduces new operations for managing databases on managed SQL Server instances.

Databases

The Rename database operation enables you rename a database hosted on a managed SQL Server instance. The serverName and databaseName path parameters identify the database to be renamed. The name body parameter specifies the new name of the database. The name must be unique. Valid characters: 0-9, A-Z, a-z, _ (underscore), - (hyphen), : (colon), and ' ' (space). Maximum length is 80 characters.

The Shrink database operation enables you to shrink the size of the data and log files. The serverName and databaseName path parameters identify the database to be renamed. The request body accepts optional truncateLogsOnly body parameter. If true, only the logs are truncated. By default, false.

SQL Server Instances

The Get jobs by server instance operation returns summary information jobs run on a specific SQL Server instance.

The Get job by server instance operation returns detailed information about a specific job on a specific SQL Server instance.

Data Bridge, August 2022

The August 2022 release of the Data Bridge API introduces group-level access controls for server instances and services that enable Data Bridge cluster security administration.

Cluster API

All connections between clients and managed SQL Server instances are encrypted automatically using Transport Layer Security (TLS). Data Bridge now enables organizations to configure the minimum version of TLS supported by the organizations managed SQL Server instances.

The Get server security service (GET /databridge/v1/Cluster/server-security) returns cluster-level security information including the minTlsVersion and allConnectedEncrypted attributes. The minTlsVersion attribute identifies the minimum version of TLS supported by the Data Bridge cluster. Clients connecting to managed SQL Server instances must supporte the minimum version to connect to the Data Bridge cluster. The allConnectedEncrypted attribute returns a Boolean value that indicates whether connections to the Data Bridge cluster encrypted. By default, true.

The Set TLS protocol service (PUT /databridge/v1/Cluster/server-security) sets the minimum TLS protocol version on the cluster. The minTlsVersion attribute is specified in the request body. Data Bridge uses Transport Layer Security (TLS) to manage connections between clients and managed SQL Server instances. By default, Data Bridge is configured to support TLS 1.2 or newer. If you need to allow a lower level of encryption to support legacy applications, Data Bridge supports setting the minimum supported TLS version as 1.0, 1.1 or 1.2. RMS recommends the default setting of TLS 1.2.

SQL Instance API

Organizations may now control access to managed SQL Servers on a group-by-group basis:

The Get groups by server instance service (GET /databridge/v1/sql-instances/{instanceName}/groups) returns a list of the groups granted access to the specified managed server instance.

The Manage groups by server instance service (PATCH /databridge/v1/sql-instances/{instanceName}/groups) grants or revokes group access to the specified managed server instance.

The server instance is identified in the endpoint path. The request body defines the groupOperations array that may be used to grant or revoke access for one or more groups:

{
  "groupOperations": [
    {
      "groupAction": 1,
      "groupId": "group1ID"
    },
    {
      "groupAction": 0,
      "groupId": "group2ID"
    }
  ]
}

Each operation object defines a groupAction and a groupId.

  • The groupAction parameter specifies the operation type. One of 0 or 1. If 0, the request revokes the access previously granted to the server instance. If 0, the request grants access to the server instance to the specified group and its members.
  • The groupId parameter identifies the group that will be granted access to the server instance or have its access revoked.

Database API

The Get groups by database service (GET /databridge/v1/sql-instances/{instanceName}/Databases/{databaseName/groups) returns a list of the groups granted access to the specified managed database.

The Manage groups by database service (PATCH /databridge/v1/sql-instances/{instanceName}/Databases/{databaseName/groups}) grants or revokes group access to the specified database.

The server instance and database are identified in the endpoint path. The request body defines the groupOperations array that may be used to grant or revoke access for one or more groups:

{
  "groupOperations": [
    {
      "groupAction": 0,
      "groupId": "string"
    }
  ]
}

Each operation object defines a groupAction and a groupId.

  • The groupAction parameter specifies the operation type. One of 0 or 1. If 0, the request revokes the access previously granted to the server instance. If 0, the request grants access to the server instance to the specified group and its members.
  • The groupId parameter identifies the group that will be granted access to the server instance or have its access revoked.

Data Bridge, June 2022

The June 2022 release features enhancements to Data Bridge role-based privileges that enable you to grant privileges to roles in custom schemas.

Custom Schema Permissions

Data Bridge employs role-based privileges to manage access to data. Data Bridge supports two roles: the Consumer role and the Contributor role. For details, see Administer Logins.

You can now grant privileges to those roles in custom schemas:

  • All Contributor users are now added to the RMS_CONTRIBUTOR_PERMISSIONS database role.
  • All Consumer users are added to the RMS_CONSUMER_PERMISSIONS database role.

For example, to grant control to all contributor-login mapped users to a user defined SCHEMA, MY_CUSTOM_SCHEMA:


CREATE SCHEMA MY_CUSTOM_SCHEMA; 

GO 

CREATE TABLE [MY_CUSTOM_SCHEMA].My_TABLE ( C1 int); 

GO 

GRANT CONTROL ON SCHEMA::MY_CUSTOM_SCHEMA TORMS_CONTRIBUTOR_PERMISSIONS