Update: Microsoft will be moving away from UserVoice sites on a product-by-product basis throughout the 2021 calendar year. We will leverage 1st party solutions for customer feedback. Learn more here.

Azure Synapse Analytics

We would love to hear your ideas for new features for Azure Synapse Analytics. Below, enter a new idea or upvote an existing one. The Synapse engineering team pays attention to all requests.

If instead you need a technical question answered or help, try the these options: DocumentationMSDN forum, and StackOverflow. If you need support, please open a support ticket.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Support Always encrypted in SQL Data warehouse

    Always Encrypted makes the data to be only available to client side applications and not visible to Database administrators also. It makes the data to be more secure. It is especially needed in the case of Azure, where PII data is stored in cloud.

    69 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  2. Support EXECUTE AS for stored procedures

    As part of the ELT procedure the user staging data should be able to call a transform procedure to ingest the data without having read/write permissions to the production tables.

    34 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  3. Use the same CREATE USER command as Azure SQL DB

    Currently, Azure SQL DB supports a version of CREATE USER that allows an SPN to connect to the database via an access token and create Azure AD users. Azure SQL DW does not, and fails with an error from Azure AD. SQL DW requires an authenticated AD user be logged into the database directly and issue the CREATE USER command.

    Making this function work the same on both platforms will allow a single DevOps deployment to create either DB and DW resources, as well as configure users for those resources, from within the deployment script.

    15 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  4. Transparent Data Encryption (TDE) by default for Studio-created SQL Pools

    Any SQL Pool I create while in the Studio, will not have TDE enabled by default. I believe this should be the default. At the very least, it should be an option in the "Additional Settings" page.

    12 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  5. Allow synapse database owner to be changed post creation

    To follow best practice of changing the ownership of the database to a disabled logon please allow this to be changed to replicate that of Azure SQL DB

    Using the same command as Azure SQL is currently giving an error

    ALTER AUTHORIZATION ON database::synapsedb001 TO disabledlogin

    Securable class 'database' not supported in this version of SQL Server

    11 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  6. Enable Row Level Security in combination with Resultset cache

    Please enable Row Level Security in combination with the use of resultset cache. We use Row Level Security a lot in PowerBI (DirectQuery mode), but this means we cannot get the performance improvements of Resultset cache. Every click in PowerBI arrives on our Synapse as well (instead of being taken by the Resultset cache)

    10 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  7. Make Azure Firewall Failure Logs available to Customers

    Most Azure products and services have a firewall that can be configured to restrict access. A valuable feature of configuring firewalls appropriately and troubleshooting connectivity issues is being able to see which connection attempts are blocked by the firewall rules. This feature is very common on other commercial firewall products. Please add this ability so that users can review firewall logs for products like SQL Server and others.

    10 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  8. 7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  9. default port

    Configure SQL Data Warehouse to listen on a port that is different from the default 1433 port such as port 80 and/or port 443.

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  10. [In Preview]Support column level encryption and decryption based on security rules.

    At this time Synapse warehouse does not support or give a method to decrypt a single column based on algorithm like AES.
    The idea is I should be able to encrypt sensitive columns in a file (bolb) outside of the database load it as is to warehouse. Once loaded I can define rules for each user and provide feature like decrypt the column if the user is allowed by fetching key from Key vault else show encrypted value for data protection.

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  11. Hide schema objects based on role

    We want to hide dbo and other custom schemas from users. We have stage, test, dbo, etc. objects in the DW. We would like to limit the schemas and/or objects that we expose to them through SQL Roles. We can limit their ability to query a certain schema, but I want to limit their ability to see it

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  12. Database auditing functionality in APS

    Currently SQL DW and SQL Server allow one to audit database access. This functionality does not exist in APS. Please provide the ability to audit data access in APS as well.

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  13. database level firewall

    The following documentation states that a database level firewall works for Azure SQL DW databases:
    https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database

    However, running the syntax mentioned results in the error:
    Msg 15165, Level 16, State 1, Line 1
    Could not find object 'spsetdatabasefirewallrule' or you do not have permission.

    Please add or fix support for the database-level firewall in Azure SQL DW

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  14. Support ALTER AUTHORIZATION for all relevant object classes

    Need to be able to change the ownership of any object in ADW that has an owner. For example a ROLE. Currently only DATABASE, SCHEMA, and OBJECT are suported.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  15. Improve the AAD login experience for supported tools where error occurs if connection is being opened for 1+ hour

    If AAD login has connection open for more than 1 hour (max token lifetime is set up to 1 hour) at time of query execution, any query that relies on AAD will fail. This includes querying storage using AAD pass-through and statements that interact with AAD (like CREATE EXTERNAL PROVIDER). This affects every tool that keeps connection open, like in query editor in SSMS and ADS. Tools that open new connection to execute query are not affected, like Synapse Studio. https://docs.microsoft.com/en-us/azure/synapse-analytics/sql/get-started-ssms#supported-tools-for-serverless-sql-pool Screenshot showing the error message when querying Parquet files in ADLS Gen2 via SQL Serverless pool when token expired…

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  16. [In Preview]support column level encryption in synapse

    There is a gdpr requirement to store privacy data encrypted in the db, existing SQL versions support this with column level security, synapse is unable to maintain this level of security.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  17. Grantable Schema-level truncate permission

    Need schema level TRUNCATE access so roles for ETL processes can be granted TRUNCATE in addition to INSERT/UPDATE/DELETE and said ETL processes don't have to own the table targeted for the TRUNCATE operation.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  18. 3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  19. API calls from SQL DW

    We need to decrypt client side encrypted data while retrieving data from SQL DW via API calls .Currently I don't see any feature in DW which supports this .Any plans to add this or any work arounds currently available for handling this kind of scenarios

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
  20. AAD MSI/SPN Authentication Using ODBC on Synapse

    Currently only SQL Password authentication is supported via ODBC on Synapse. We prefer AAD auth (SPN/preferably MSI) due to compliance and security reasons. Hence it would be great to have this feature.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  SQL/Security  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1
  • Don't see your idea?

Feedback and Knowledge Base