Verify that your environment meets the system requirements to configure Azure SQL Managed Instance backups using a backup gateway.
Commvault Software
- Verify that the SQL Server Agent is installed on the backup gateway.
Network Requirements
-
Verify that the following ports are open on the backup gateway that has access to the Azure cloud:
-
443 to management.azure.com
-
1433 to *.database.windows.net
-
Access Node Operating System Requirements
For restoring an on-premises backup to the Azure cloud, install the SQL Server on the access node.
The operating system of the access node can be either Red Hat Enterprise Linux or Windows.
Important
Use the most recent version of the operating system that is listed. The Commvault software fully supports the most recent version of an operating system, until the vendor ends support. More recent versions of the Commvault software might not install on operating systems that are not supported by the vendor anymore. For information about the support lifecycle of an operating system, contact the vendor.
Linux
For information about SQL Server on Linux, see Microsoft guidelines for SQL Server on Linux on the Microsoft website.
Important
The following operating systems are supported only for the following versions of Microsoft SQL Server. Microsoft has a known issue on Microsoft SQL server 2017 cumulative updates 19 and 20.
-
Microsoft SQL Server 2017 cumulative update 18 or lower
-
Microsoft SQL Server 2017 cumulative update 21 and higher
-
Microsoft SQL Server 2019 cumulative update 5 and higher
-
Microsoft SQL Server 2022
|
Operating System |
Applies to SQL Server Version |
|---|---|
|
Red Hat Enterprise Linux 8.0 to 8.6 |
SQL Server 2022, SQL Server 2019, SQL Server 2017 |
|
Red Hat Enterprise Linux 7.7 to 7.9 |
SQL Server 2019, SQL Server 2017 |
|
SUSE Enterprise Linux Server v15 SP1 - SP4 |
SQL Server 2022, SQL Server 2019 |
|
SUSE Enterprise Linux Server v12 SP3 - SP5 |
SQL Server 2019, SQL Server 2017 |
|
Ubuntu 20.04 LTS |
SQL Server 2022, SQL Server 2019 |
|
Ubuntu 18.04 |
SQL Server 2019, SQL Server 2017 |
|
Ubuntu 16.04 |
SQL Server 2019, SQL Server 2017 |
Windows
|
Operating system |
Processor architecture |
|---|---|
|
Microsoft Windows Server 2025 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2022 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2019 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2016 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2012 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2012 R2 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows 10 |
All Windows-compatible processors are supported |
|
Microsoft Windows 7 Editions |
All Windows-compatible processors are supported |
|
Microsoft Windows Server 2008 R2 Editions |
All Windows-compatible processors are supported |
SQL Server User Accounts and Authentication
This section describes the supported user accounts and authentication methods for Azure SQL Database.
Azure SQL Database supports the following types of user accounts for data protection:
-
Azure SQL Server Admin account: Serves as the server administrator for the Azure SQL instance.
-
Microsoft Entra Password: Manages user accounts, security settings, and permissions for users who access the Azure SQL Database.
-
Ensure that login names for user accounts are in UPN (User Principal Name) format.
Note
Multifactor authentication is not supported.
-
Install the Microsoft Active Directory Authentication Library (ADAL) for Microsoft SQL Server or SQL Server Management Studio (SSMS) on the access node.
-
-
Database user: A database-level account used to configure minimal permissions for data protection operations. This authentication type requires the following minimum permissions:
Server-Level Roles
Database-Level Roles
None
- db_owner on the database being backed up
-
dbmanager on the master database
This role is required to delete the temporary transactionally consistent database copy during the backup operation and is required for the restore operation to create the database.
The following authentication methods are supported:
-
Microsoft Entra Managed Identity: Provides a secure, credential-less method for Azure resources to authenticate and authorize with other services that support Microsoft Entra authentication.
Both system-assigned and user-assigned managed identities are supported.
For more information, see Enabling Microsoft Entra Managed Identity Authentication.
-
Microsoft Entra Service Principal: Provides a secure method to authenticate and access Azure SQL resources without using individual user credentials.
For more information, see Enabling Microsoft Entra Service Principal Authentication.
Supported TLS Version
The software supports database protection operations on TLS version 1.2.