DEV Community

Shekhar Tarare
Shekhar Tarare

Posted on • Originally published at shekhartarare.com

Running a SQL Script from the Azure Pipeline using a Service Principal with Certificate

Introduction:

Azure Pipelines is a powerful tool for automating software delivery and deployment processes. When working with databases, it is often necessary to execute SQL scripts as part of the deployment pipeline. In this blog post, we will explore how to run a SQL script from an Azure Pipeline using a Service Principal with Certificate authentication. This approach offers a secure and efficient way to manage database changes within your CI/CD workflow.


Prerequisites:

Let’s ensure we have the necessary prerequisites in place:

1. Azure DevOps Account: You should have an active Azure DevOps account with the appropriate permissions to create and manage pipelines.

2. SQL Server or Azure SQL Database: You need to have an existing SQL Server or Azure SQL Database instance where the SQL script will be executed.


What is Service Principal?

Before we delve into the step-by-step process, let’s first try to understand what exactly is Service Principal:

A service principal is like a virtual identity or a user account created specifically for a service or application to access resources in a secure manner. It is typically used in cloud environments, such as Microsoft Azure or AWS, where services and applications need to interact with other resources, like databases, storage, or APIs.

For example, let’s say you have a chatbot that needs to access a database to retrieve information. Instead of using your personal username and password to connect to the database, you can create a service principal for the chatbot.

The service principal will have its own set of login credentials, like a username and password, that are separate from your personal account. These credentials are used by the chatbot to securely access the database.

By using a service principal, you keep your personal account information safe and make sure that only the chatbot has access to the database, without needing to use your own credentials. It’s like giving the chatbot its own “special” login that it can use to do its job without accessing your personal account.


Step 2: Create a Service Principal in Azure Portal

  1. Sign in to the Azure portal (https://portal.azure.com) with your Azure account credentials.

  2. Navigate to the Azure Active Directory (AD) service.

  3. Under the App registrations section, click on New registration to create a new application registration.

    IApp registration list

  4. Provide a name for your service principal and select the appropriate account type. For example, you can choose between Accounts in this organizational directory only or Accounts in any organizational directory.

    Registration page

  5. Once created, note down the Application (client) ID and Directory (tenant) ID as these will be needed later during the service connection setup.

    Overview

  6. Under the Certificates & secrets section, go to Certificates tab, click on Upload certificate button, and select the certificate in CER format, which we have downloaded before.

Certificate and secrets page


Step 3: Provide the Access to the Service Principal

We have set up the service principal. Now, we need to grant the necessary access of the Azure SQL server to the service principal, enabling it to execute the queries on the database.

  1. Go to Azure portal and click on Azure Active Directory.

  2. Click on Groups.

  3. Click on New group

  4. Give a Group name. Select the service principal, which we have created earlier as a member and click on Create to create the group.

New group page

We have to set the Azure AD group (AzureAdmin_SQL) as Active Directory admin on the SQL Server. Let’s do this:

  1. Go to your SQL Server and click on Azure Active Directory under Settings.

  2. Click on Set admin. Select your AD group from the dropdown, click on it and click Select. Click Save to save it.

    Azure directory admin

Note: After setting the Azure Directory Admin. The members of that group will be granted administrative privileges on the SQL Server. This means they will have elevated permissions and full control over the SQL Server instance.


Step 4: Create a Service Connection in Azure Pipelines

  1. Open your Azure DevOps organization and navigate to your project.

  2. Go to Project settings.

    Go to project settings

  3. Select Service connections under the Pipelines section and click on New service connection.

    Service connection page

  4. Choose the appropriate service connection type based on your requirements. For example, you can select Azure Resource Manager for interacting with Azure resources.

  5. Select the Azure Resource Manager option and click on Next.

    select azure resource manager

  6. Select the appropriate authentication method. In this case, choose Service principal (manual) to manually enter the credentials.

    Authentication method

  7. Enter the Application (client) ID, Directory (tenant) ID and the content of the certificate which was in PEM format, we have downloaded this already.

  8. Optionally, you can test the connection to ensure it is successful.

    Test the connection

  9. Provide Service connection name and click on Verify and save to create the service connection.

    Verify and save

Note: You may encounter the following error if you fail to grant the service principal the necessary Azure subscription access permission.

You may get this error

To solve this error. Follow the below steps:

  1. Login to Azure Portal

  2. Click on All Services

  3. Click on Subscriptions

  4. Go to Access Control (IAM). Click on Add and select Add role assignment.

    IAM

  5. Select the Role. I have selected Contributor for now. Select the radio button for User, group or service principal in Assign access to. Select the service principal name as a Member, click on Review, and assign to add the role.

  6. Now, try to click on verify under Service Connection screen. It will succeed.


Step 5: Generate an Access Token

  1. Open your Azure DevOps organization and go to your project.

  2. Navigate to the Releases section and create a new release pipeline. Add a new empty stage to it and name it anything. I have named it Generate Token.

    New release pipeline

  3. Open the Generate Token stage, under the Agent job, select the appropriate agent and add a new task.

    Add new task

  4. Search for the Azure CLI task and add it to the pipeline.

    Search for azure CLI

  5. Configure the task to use the created service connection by selecting the appropriate service connection from the Azure Resource Manager connection dropdown. Select Script Type to PowerShell and Script Location to Inline script.

    configuration page

  6. Enter the below PowerShell script under Inline script:

$token= & az account get-access-token - resource=https://database.windows.net - query accessToken
Write-Host("##vso[task.setvariable variable=accessToken]$token")
Enter fullscreen mode Exit fullscreen mode

Let’s try to understand the code:

  • The “az account get-access-token” command retrieves an access token for the specified resource.
  • The access token obtained using the Azure CLI command with the “ — resource“parameter set to “https://database.windows.net” can be used to authenticate and authorize access to Azure SQL Database resources.
  • The “ — query accessToken” option filters the command output to extract the value of the accessToken field.
  • The extracted access token is assigned to the “$token” variable in PowerShell for further use.

Step 6: Open the SQL Connection and run the script

We can use the access token generated on the previous step to open the SQL connection and run queries. Let’s add a task on the pipeline to do this:

  1. Add a new task on our existing stage (Generate Token). Search for PowerShell and add it. Select Inline from the Type dropdown.

    Add a new task

  2. Add the below code under Script.

$sqlServerFQN = '$(SqlServerFQN)'; 
$sqlDatabaseName = '$(SqlDatabaseName)'; 
$conn = new-object System.Data.SqlClient.SqlConnection; $conn.ConnectionString = "Server=tcp:$($sqlServerFQN),1433;Initial Catalog=$($sqlDatabaseName);Persist Security Info=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=30;"; 
$conn.AccessToken = $(accessToken); 
$conn.Open();
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand;
$SqlCmd.CommandText = "alter role db_ddladmin add member [guest];";
$SqlCmd.Connection = $conn;
$SqlCmd.ExecuteNonQuery();
$conn.Close();
Enter fullscreen mode Exit fullscreen mode

Explanation of the above code:

  • $sqlServerFQN: Represents the fully qualified name (FQN) of the SQL Server instance.
  • $sqlDatabaseName: Represents the name of the SQL database.
  • It opens the SQL connection using the details provided and runs the query.
  • For testing, we are assigning the role of db_ddladmin to the guest user. It closes the connection after running the query.
  1. Make sure to add these 2 variables by going to variables tab. We are using this in the PowerShell code.

    Set variables

  2. Our setup is ready. Run the release pipeline, it will run the query on the database.


Conclusion:

Running a SQL script from an Azure Pipeline using a Service Principal with Certificate authentication offers a secure and streamlined approach for database deployments. By following the steps outlined in this blog post, you can integrate SQL script execution seamlessly into your CI/CD workflow, ensuring consistent and reliable database changes. Automating database deployments with Azure Pipelines helps increase productivity, reduce manual errors, and improve overall software delivery efficiency.

Top comments (0)