Skip to content

Commit 0690e85

Browse files
Clare Zheng (Shanghai Wicresoft Co Ltd)Clare Zheng (Shanghai Wicresoft Co Ltd)
authored andcommitted
Update URL
1 parent 23f011b commit 0690e85

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/data-factory/connector-sql-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ To use user-assigned managed identity authentication, in addition to the generic
295295

296296
You also need to follow the steps below:
297297

298-
1. [Grant permissions to your user-assigned managed identity in Microsoft Entra ID](/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm?view=azuresql&tabs=azure-portal#grant-permissions).
298+
1. [Grant permissions to your user-assigned managed identity in Microsoft Entra ID](/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm?view=azuresql&preserve-view=true&tabs=azure-portal#grant-permissions).
299299

300300
1. [Provision a Microsoft Entra administrator](/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm#grant-permissions) for your server on the Azure portal if you haven't already done so. The Microsoft Entra administrator can be a Microsoft Entra user or a Microsoft Entra group. If you grant the group with user-assigned managed identity an admin role, skip steps 4. The administrator has full access to the database.
301301

0 commit comments

Comments
 (0)