Skip to content

Commit 151083b

Browse files
Merge pull request #252376 from niklarin/aad2
AAD public preview update
2 parents 8f8d50f + 0c882f0 commit 151083b

File tree

5 files changed

+19
-23
lines changed

5 files changed

+19
-23
lines changed

articles/cosmos-db/postgresql/concepts-authentication.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: nlarin
66
ms.service: cosmos-db
77
ms.subservice: postgresql
88
ms.topic: conceptual
9-
ms.date: 08/02/2023
9+
ms.date: 09/19/2023
1010
---
1111

1212
# Azure Active Directory and PostgreSQL authentication with Azure Cosmos DB for PostgreSQL
@@ -19,9 +19,6 @@ ms.date: 08/02/2023
1919
> for production workloads. Certain features might not be supported or might have constrained
2020
> capabilities.
2121
>
22-
> [Contact us](mailto:[email protected]) if you're interested in participating in Azure Active Directory authentication
23-
> for Azure Cosmos DB for PostgreSQL preview.
24-
>
2522
> You can see a complete list of other new features in [preview features](product-updates.md#features-in-preview).
2623
2724
Azure Cosmos DB for PostgreSQL supports PostgreSQL authentication and integration with Azure Active Directory (Azure AD). Each Azure Cosmos DB for PostgreSQL cluster is created with native PostgreSQL authentication enabled and one built-in PostgreSQL role named `citus`. You can add more native PostgreSQL roles after cluster provisioning is completed.
@@ -106,6 +103,7 @@ Once you've authenticated against the Active Directory, you then retrieve a toke
106103

107104
## Next steps
108105

109-
- To learn how to configure authentication for Azure Cosmos DB for PostgreSQL clusters, see [Use Azure Active Directory and native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL](./how-to-configure-authentication.md).
110-
- To set up private network access to the cluster nodes, see [Manage private access](./howto-private-access.md).
111-
- To set up public network access to the cluster nodes, see [Manage public access](./howto-manage-firewall-using-portal.md).
106+
- Check out [Azure AD limits and limitations in Azure Cosmos DB for PostgreSQL](./reference-limits.md#azure-active-directory-authentication)
107+
- [Learn how to configure authentication for Azure Cosmos DB for PostgreSQL clusters](./how-to-configure-authentication.md)
108+
- Set up private network access to the cluster nodes, see [Manage private access](./howto-private-access.md)
109+
- Set up public network access to the cluster nodes, see [Manage public access](./howto-manage-firewall-using-portal.md)

articles/cosmos-db/postgresql/concepts-row-level-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: jonels-msft
66
ms.service: cosmos-db
77
ms.subservice: postgresql
88
ms.topic: conceptual
9-
ms.date: 01/30/2023
9+
ms.date: 10/02/2023
1010
---
1111

1212
# Row-level security in Azure Cosmos DB for PostgreSQL
@@ -30,7 +30,7 @@ security policies can compare the role name to values in the `tenant_id`
3030
distribution column to decide whether to allow access.
3131

3232
Here's how to apply the approach on a simplified events table distributed by
33-
`tenant_id`. First [create the roles](howto-create-users.md) `tenant1` and
33+
`tenant_id`. First [create the roles](./how-to-configure-authentication.md#configure-native-postgresql-authentication) `tenant1` and
3434
`tenant2`. Then run the following SQL commands as the `citus` administrator
3535
user:
3636

@@ -113,5 +113,5 @@ ERROR: new row violates row-level security policy for table "events_102055"
113113

114114
## Next steps
115115

116-
Learn how to [create roles](howto-create-users.md) in a
117-
cluster.
116+
- Learn how to [create roles](./how-to-configure-authentication.md#configure-native-postgresql-authentication) in a cluster.
117+
- Check out [security concepts in Azure Cosmos DB for PostgreSQL](./concepts-security-overview.md)

articles/cosmos-db/postgresql/how-to-configure-authentication.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Use Azure Active Directory and native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL
3-
description: Learn how to set up Azure Active Directory (Azure AD) and add native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL.
3+
description: Learn how to set up Azure Active Directory (Azure AD) and add native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL
44
author: niklarin
55
ms.author: nlarin
66
ms.service: cosmos-db
77
ms.subservice: postgresql
88
ms.topic: how-to
9-
ms.date: 08/01/2023
9+
ms.date: 09/19/2023
1010
---
1111

1212
# Use Azure Active Directory and native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL
@@ -19,9 +19,6 @@ ms.date: 08/01/2023
1919
> for production workloads. Certain features might not be supported or might have constrained
2020
> capabilities.
2121
>
22-
> [Contact us](mailto:[email protected]) if you're interested in participating in Azure Active Directory authentication
23-
> for Azure Cosmos DB for PostgreSQL preview.
24-
>
2522
> You can see a complete list of other new features in [preview features](product-updates.md#features-in-preview).
2623
2724
In this article, you configure authentication methods for Azure Cosmos DB for PostgreSQL. You manage Azure Active Directory (Azure AD) admin users and native PostgreSQL roles for authentication with Azure Cosmos DB for PostgreSQL. You also learn how to use an Azure AD token with Azure Cosmos DB for PostgreSQL.
@@ -213,6 +210,7 @@ GRANT SELECT ON ALL TABLES IN SCHEMA public TO "[email protected]";
213210

214211
## Next steps
215212

216-
- Learn about [authentication in Azure Cosmos DB for PostgreSQL](./concepts-authentication.md).
217-
- Review [Azure Active Directory fundamentals](./../../active-directory/fundamentals/active-directory-whatis.md).
218-
- [Learn more about SQL GRANT in PostgreSQL](https://www.postgresql.org/docs/current/sql-grant.html).
213+
- Learn about [authentication in Azure Cosmos DB for PostgreSQL](./concepts-authentication.md)
214+
- Check out [Azure AD limits and limitations in Azure Cosmos DB for PostgreSQL](./reference-limits.md#azure-active-directory-authentication)
215+
- Review [Azure Active Directory fundamentals](./../../active-directory/fundamentals/active-directory-whatis.md)
216+
- [Learn more about SQL GRANT in PostgreSQL](https://www.postgresql.org/docs/current/sql-grant.html)

articles/cosmos-db/postgresql/howto-restore-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: cosmos-db
77
ms.subservice: postgresql
88
ms.custom: ignite-2022, references_regions
99
ms.topic: how-to
10-
ms.date: 09/17/2023
10+
ms.date: 10/02/2023
1111
---
1212

1313
# Backup and point-in-time restore of a cluster in Azure Cosmos DB for PostgreSQL
@@ -96,7 +96,7 @@ back up and running:
9696
and client applications to the new cluster.
9797
* Ensure appropriate [networking settings for private or public access](./concepts-security-overview.md#network-security) are in place for
9898
users to connect. These settings aren't copied from the original cluster.
99-
* Ensure appropriate [logins](./howto-create-users.md) and database level permissions are in place.
99+
* Ensure appropriate [logins](./how-to-configure-authentication.md#configure-native-postgresql-authentication) and database level permissions are in place.
100100
* Configure [alerts](./howto-alert-on-metric.md#suggested-alerts), as appropriate.
101101

102102
## Next steps

articles/cosmos-db/postgresql/quickstart-connect-psql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: cosmos-db
88
ms.subservice: postgresql
99
ms.custom: mvc, mode-ui, ignite-2022
1010
ms.topic: quickstart
11-
ms.date: 06/07/2023
11+
ms.date: 10/02/2023
1212
---
1313

1414
# Connect to a cluster with psql - Azure Cosmos DB for PostgreSQL
@@ -30,7 +30,7 @@ Your cluster has a default database named `citus`. To connect to the database, y
3030

3131
:::image type="content" source="media/quickstart-connect-psql/get-connection-string.png" alt-text="Screenshot that shows copying the psql connection string.":::
3232

33-
The **psql** string is of the form `psql "host=c-<cluster>.<uniqueID>.postgres.cosmos.azure.com port=5432 dbname=citus user=citus password={your_password} sslmode=require"`. Notice that the host name starts with a `c.`, for example `c-mycluster.12345678901234.postgres.cosmos.azure.com`. This prefix indicates the coordinator node of the cluster. The default `dbname` is `citus` and can be changed only at cluster provisioning time. The `user` can be any valid [Postgres role](./howto-create-users.md) on your cluster.
33+
The **psql** string is of the form `psql "host=c-<cluster>.<uniqueID>.postgres.cosmos.azure.com port=5432 dbname=citus user=citus password={your_password} sslmode=require"`. Notice that the host name starts with a `c.`, for example `c-mycluster.12345678901234.postgres.cosmos.azure.com`. This prefix indicates the coordinator node of the cluster. The default `dbname` is `citus` and can be changed only at cluster provisioning time. The `user` can be any valid [Postgres role](./how-to-configure-authentication.md#configure-native-postgresql-authentication) on your cluster.
3434

3535
1. Open Azure Cloud Shell by selecting the **Cloud Shell** icon on the top menu bar.
3636

0 commit comments

Comments
 (0)