You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
12
12
ms.topic: tutorial
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
-
ms.date: 02/18/2022
15
+
ms.date: 05/25/2023
16
16
ms.author: barclayn
17
17
ms.collection: M365-identity-device-management
18
18
#Customer intent: As a developer or administrator I want to configure a Windows virtual machine to retrieve a secret from key vault using a managed identity and have a simple way to validate my configuration before using it for development
This tutorial shows you how to use a system-assigned identity for a Windows virtual machine (VM) to access Azure SQL Database. Managed Service Identities are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication, without needing to insert credentials into your code. You learn how to:
23
22
@@ -50,20 +49,21 @@ There are two steps to granting your VM access to a database:
50
49
**To [configure Azure AD authentication](/azure/azure-sql/database/authentication-aad-configure):**
51
50
52
51
1. In the Azure portal, select **SQL servers** from the left-hand navigation.
53
-
2.Click the SQL server to be enabled for Azure AD authentication.
52
+
2.Select the SQL server to be enabled for Azure AD authentication.
54
53
3. In the **Settings** section of the blade, click **Active Directory admin**.
55
54
4. In the command bar, click **Set admin**.
56
55
5. Select an Azure AD user account to be made an administrator of the server, and click **Select.**
57
56
6. In the command bar, click **Save.**
58
57
58
+
59
59
### Create contained user
60
60
61
61
This section shows how to create a contained user in the database that represents the VM's system assigned identity. For this step, you need [Microsoft SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS). Before beginning, it may also be helpful to review the following articles for background on Azure AD integration:
62
62
63
63
-[Universal Authentication with SQL Database and Azure Synapse Analytics (SSMS support for MFA)](/azure/azure-sql/database/authentication-mfa-ssms-overview)
64
64
-[Configure and manage Azure Active Directory authentication with SQL Database or Azure Synapse Analytics](/azure/azure-sql/database/authentication-aad-configure)
65
65
66
-
SQL DB requires unique Azure AD display names. With this, the Azure AD accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Azure AD regarding their display names. SQL DB checks the Azure AD display name during T-SQL creation of such users and if it is not unique, the command fails requesting to provide a unique Azure AD display name for a given account.
66
+
SQL DB requires unique Azure AD display names. With this, the Azure AD accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Azure AD regarding their display names. SQL DB checks the Azure AD display name during T-SQL creation of such users and if it isn't unique, the command fails requesting to provide a unique Azure AD display name for a given account.
67
67
68
68
**To create a contained user:**
69
69
@@ -75,7 +75,7 @@ SQL DB requires unique Azure AD display names. With this, the Azure AD accounts
75
75
6. In the **Connect to database** field, enter the name of the non-system database you want to configure.
76
76
7. Click **Connect**. Complete the sign-in process.
77
77
8. In the **Object Explorer**, expand the **Databases** folder.
78
-
9. Right-click on a user database and click**New query**.
78
+
9. Right-click on a user database and select**New query**.
79
79
10. In the query window, enter the following line, and click **Execute** in the toolbar:
80
80
81
81
> [!NOTE]
@@ -89,7 +89,7 @@ SQL DB requires unique Azure AD display names. With this, the Azure AD accounts
89
89
11. Clear the query window, enter the following line, and click **Execute** in the toolbar:
90
90
91
91
> [!NOTE]
92
-
> `VMName` in the following command is the name of the VM that you enabled system assigned identity on in the prerequsites section.
92
+
> `VMName` in the following command is the name of the VM that you enabled system assigned identity on in the prerequisites section.
0 commit comments