DEV Community

Shekhar Tarare
Shekhar Tarare

Posted on • Originally published at shekhartarare.com

Running a SQL Script from the Azure Pipeline using a Service Principal with Client Secret

Introduction:

In today’s fast-paced software development landscape, automation plays a crucial role in ensuring efficient and error-free deployments. Azure Pipelines, a key component of Azure DevOps, provides a comprehensive solution for automating build, test, and deployment processes. One common requirement in application deployments is executing SQL scripts as part of the CI/CD pipeline. In this blog post, we will explore a secure and reliable method of executing SQL scripts from an Azure Pipeline using a Service Connection with a Client Secret. This approach not only enhances the automation capabilities of Azure Pipelines but also ensures the confidentiality and integrity of your SQL Server or Azure SQL Database.


Prerequisites:

Let’s ensure we have the necessary prerequisites in place:

  1. Azure DevOps Account: You should have an active Azure DevOps account with the appropriate permissions to create and manage pipelines.
  2. SQL Server or Azure SQL Database: You need to have an existing SQL Server or Azure SQL Database instance where the SQL script will be executed.

What is Service Principal?

Before we delve into the step-by-step process, let’s first try to understand what exactly is Service Principal:

A service principal is like a virtual identity or a user account created specifically for a service or application to access resources in a secure manner. It is typically used in cloud environments, such as Microsoft Azure or AWS, where services and applications need to interact with other resources, like databases, storage, or APIs.

For example, let’s say you have a chatbot that needs to access a database to retrieve information. Instead of using your personal username and password to connect to the database, you can create a service principal for the chatbot.

The service principal will have its own set of login credentials, like a username and password, that are separate from your personal account. These credentials are used by the chatbot to securely access the database.

By using a service principal, you keep your personal account information safe and make sure that only the chatbot has access to the database, without needing to use your own credentials. It’s like giving the chatbot its own “special” login that it can use to do its job without accessing your personal account.


Step 1: Create a Service Principal in Azure Portal

  1. Sign in to the Azure portal (https://portal.azure.com) with your Azure account credentials.
  2. Navigate to the Azure Active Directory (AD) service.
  3. Under the App registrations section, click on New registration to create a new application registration.

    App registration list

  4. Provide a name for your service principal and select the appropriate account type. For example, you can choose between Accounts in this organizational directory only or Accounts in any organizational directory.

    Register an application

  5. Once created, note down the Application (client) ID and Directory (tenant) ID as these will be needed later during the service connection setup.

    App overview

  6. Under the Certificates & secrets section, create a new client secret, and securely store the generated value for later use. Remember that, the secret value will be shown only once after that it will be hidden. If you forgot or lost the secret value, then you have to generate the new one. This secret will be required to authenticate your service principal.

    Certificates and secret


Step 2: Provide the Access to the Service Principal

We have set up the service principal. Now, we need to grant the necessary access of the Azure SQL server to the service principal, enabling it to execute the queries on the database.

  1. Go to Azure portal and click on Azure Active Directory.

  2. Click on Groups.

  3. Click on New group

  4. Give a Group name. Select the service principal, which we have created earlier as a member and click on Create to create the group.

    New group

We have to set the Azure AD group (AzureAdmin_SQL) as Active Directory admin on the SQL Server. Let’s do this:

  1. Go to your SQL Server and click on Azure Active Directory under Settings.

  2. Click on Set admin. Select your AD group from the dropdown, click on it and click Select. Click Save to save it.

    Active directory admin
    Note: After setting the Azure Directory Admin. The members of that group will be granted administrative privileges on the SQL Server. This means they will have elevated permissions and full control over the SQL Server instance.


Step 3: Create a Service Connection in Azure Pipelines

  1. Open your Azure DevOps organization and navigate to your project.

  2. Go to Project settings.

    Project settings

  3. Select Service connections under the Pipelines section and click on New service connection.

    Service connections

  4. Choose the appropriate service connection type based on your requirements. For example, you can select Azure Resource Manager for interacting with Azure resources.

  5. Select the Azure Resource Manager option and click on Next.

    New service connection

  6. Select the appropriate authentication method. In this case, choose Service principal (manual) to manually enter the credentials.

    Authentication method

  7. Enter the Application (client) ID, Directory (tenant) ID and the client secret of the service principal.

  8. Optionally, you can test the connection to ensure it is successful.

    New azure service connection

  9. Provide Service connection name and click on Verify and save to create the service connection.

    Verify and save

Note: You may encounter the following error if you fail to grant the service principal the necessary Azure subscription access permission.

If you got this

To solve this error. Follow the below steps:

  1. Login to Azure Portal

  2. Click on All Services

  3. Click on Subscriptions

  4. Go to Access Control (IAM). Click on Add and select Add role assignment.

    Access control

  5. Select the Role. I have selected Contributor for now. Select the radio button for User, group or service principal in Assign access to. Select the service principal name as a Member, click on Review, and assign to add the role.

  6. Now, try to click on verify under Service Connection screen. It will succeed.

    save the settings


Step 4: Generate an Access Token

  1. Open your Azure DevOps organization and go to your project.

  2. Navigate to the Releases section and create a new release pipeline. Add a new empty stage to it and name it anything. I have named it Generate Token.

    Create new release pipeline

  3. Open the Generate Token stage, under the Agent job, select the appropriate agent and add a new task.

    New agent

  4. Search for the Azure CLI task and add it to the pipeline.

    Search for Azure CLI task

  5. Configure the task to use the created service connection by selecting the appropriate service connection from the Azure Resource Manager connection dropdown. Select Script Type to PowerShell and Script Location to Inline script.

    Generate token

  6. Enter the below PowerShell script under Inline script:

$token= & az account get-access-token --resource=https://database.windows.net --query accessToken
Write-Host("##vso[task.setvariable variable=accessToken]$token")
Enter fullscreen mode Exit fullscreen mode

Explanation of the above code:

  • The “az account get-access-token” command retrieves an access token for the specified resource.
  • The access token obtained using the Azure CLI command with the “ — resource“parameter set to “https://database.windows.net” can be used to authenticate and authorize access to Azure SQL Database resources.
  • The “ — query accessToken” option filters the command output to extract the value of the accessToken field.
  • The extracted access token is assigned to the “$token” variable in PowerShell for further use.

Step 5: Open the SQL Connection and run the script

We can use the access token generated on the previous step to open the SQL connection and run queries. Let’s add a task on the pipeline to do this:

  1. Add a new task on our existing stage (Generate Token). Search for PowerShell and add it. Select Inline from the Type dropdown.

    Add powershell script

  2. Add the below code under Script.

$sqlServerFQN = '$(SqlServerFQN)'; 
$sqlDatabaseName = '$(SqlDatabaseName)'; 
$conn = new-object System.Data.SqlClient.SqlConnection; $conn.ConnectionString = "Server=tcp:$($sqlServerFQN),1433;Initial Catalog=$($sqlDatabaseName);Persist Security Info=False;Encrypt=True;TrustServerCertificate=False;Connection Timeout=30;"; 
$conn.AccessToken = $(accessToken); 
$conn.Open();
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand;
$SqlCmd.CommandText = "alter role db_ddladmin add member [guest];";
$SqlCmd.Connection = $conn;
$SqlCmd.ExecuteNonQuery();
$conn.Close();
Enter fullscreen mode Exit fullscreen mode

Explanation of the above code:

  • $sqlServerFQN: Represents the fully qualified name (FQN) of the SQL Server instance.
  • $sqlDatabaseName: Represents the name of the SQL database.
  • It opens the SQL connection using the details provided and runs the query.
  • For testing, we are assigning the role of db_ddladmin to the guest user. It closes the connection after running the query.
  1. Make sure to add these 2 variables by going to Variables tab. We are using those in the PowerShell code.

    add this variables

  2. Our setup is ready. Run the release pipeline, it will run the query on the database.


Conclusion:

Congratulations! You have successfully ran the SQL query in the Azure Pipeline using the service connection with client secret. By following the steps outlined in this tutorial, you can enhance the security and efficiency of your Azure DevOps workflows by leveraging service principals and service connections.

Top comments (0)