You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: release-notes/7.0/7.0.0-preview2.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,19 +40,24 @@ This update brings the following changes since the [7.0.0-preview1](7.0.0-previe
40
40
41
41
- If your environment might be affected (i.e., you operate a BAG with custom ports, or have experienced failures after failover), you can enable the new switch in your application:
- Then, ensure your connection string includes your preferred failover partner (with correct `tcp:host,port`) so that the client uses that instead of the server's suggestion.
48
48
- Without enabling this, by default, the client continues to prefer the server-provided partner, maintaining backwards compatibility.
49
49
50
-
51
50
#### Other Additions
52
51
53
52
- Add app context switch for enabling asynchronous multi-packet improvements
- Teams moving toward stronger, passwordless or MFA-compliant auth (in line with changes across MSAL/Azure.Identity and Entra MFA enforcement). This aligns Microsoft.Data.SqlClient with Microsoft's direction to avoid username/password (ROPC) flows. See https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mandatory-multifactor-authentication for more explanation of why this change is being made across Microsoft products/services.
72
+
- Teams moving toward stronger, passwordless or MFA-compliant auth (in line with changes across MSAL/Azure.Identity and Entra MFA enforcement). This aligns Microsoft.Data.SqlClient with Microsoft's direction to avoid username/password (ROPC) flows. See [Planning for mandatory multifactor authentication for Azure and other admin portals](https://learn.microsoft.com/entra/identity/authentication/concept-mandatory-multifactor-authentication) for more explanation of why this change is being made across Microsoft products/services.
- See https://learn.microsoft.com/en-us/sql/connect/ado-net/sql/azure-active-directory-authentication for more information on authentication to SQL Server using Microsoft Entra.
81
+
- See [Connect to Azure SQL with Microsoft Entra authentication and SqlClient](https://learn.microsoft.com/sql/connect/ado-net/sql/azure-active-directory-authentication) for more information on authentication to SQL Server using Microsoft Entra.
77
82
78
83
#### Other changes
79
84
80
-
- Improve performance in `SqlStatistics` by using `Environment.TickCount` for calculating execution timing
85
+
- Improve performance in `SqlStatistics` by using `Environment.TickCount` for calculating execution timing
0 commit comments