Skip to content

Commit 1bf4ebc

Browse files
committed
updating freshness'
1 parent 369de38 commit 1bf4ebc

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed
Loading

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: List of services supporting managed identities
44
services: active-directory
55
author: barclayn
66
ms.author: barclayn
7-
ms.date: 01/10/2022
7+
ms.date: 05/25/2023
88
ms.topic: conceptual
99
ms.service: active-directory
1010
ms.subservice: msi

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: tutorial
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 02/18/2022
15+
ms.date: 05/25/2023
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
#Customer intent: As a developer or administrator I want to configure a Windows virtual machine to retrieve a secret from key vault using a managed identity and have a simple way to validate my configuration before using it for development

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,12 @@ ms.subservice: msi
1111
ms.topic: tutorial
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/11/2022
14+
ms.date: 05/25/2023
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
---
1818
# Tutorial: Use a Windows VM system-assigned managed identity to access Azure SQL
1919

20-
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2120

2221
This tutorial shows you how to use a system-assigned identity for a Windows virtual machine (VM) to access Azure SQL Database. Managed Service Identities are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication, without needing to insert credentials into your code. You learn how to:
2322

@@ -50,20 +49,21 @@ There are two steps to granting your VM access to a database:
5049
**To [configure Azure AD authentication](/azure/azure-sql/database/authentication-aad-configure):**
5150

5251
1. In the Azure portal, select **SQL servers** from the left-hand navigation.
53-
2. Click the SQL server to be enabled for Azure AD authentication.
52+
2. Select the SQL server to be enabled for Azure AD authentication.
5453
3. In the **Settings** section of the blade, click **Active Directory admin**.
5554
4. In the command bar, click **Set admin**.
5655
5. Select an Azure AD user account to be made an administrator of the server, and click **Select.**
5756
6. In the command bar, click **Save.**
5857

58+
5959
### Create contained user
6060

6161
This section shows how to create a contained user in the database that represents the VM's system assigned identity. For this step, you need [Microsoft SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS). Before beginning, it may also be helpful to review the following articles for background on Azure AD integration:
6262

6363
- [Universal Authentication with SQL Database and Azure Synapse Analytics (SSMS support for MFA)](/azure/azure-sql/database/authentication-mfa-ssms-overview)
6464
- [Configure and manage Azure Active Directory authentication with SQL Database or Azure Synapse Analytics](/azure/azure-sql/database/authentication-aad-configure)
6565

66-
SQL DB requires unique Azure AD display names. With this, the Azure AD accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Azure AD regarding their display names. SQL DB checks the Azure AD display name during T-SQL creation of such users and if it is not unique, the command fails requesting to provide a unique Azure AD display name for a given account.
66+
SQL DB requires unique Azure AD display names. With this, the Azure AD accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Azure AD regarding their display names. SQL DB checks the Azure AD display name during T-SQL creation of such users and if it isn't unique, the command fails requesting to provide a unique Azure AD display name for a given account.
6767

6868
**To create a contained user:**
6969

@@ -75,7 +75,7 @@ SQL DB requires unique Azure AD display names. With this, the Azure AD accounts
7575
6. In the **Connect to database** field, enter the name of the non-system database you want to configure.
7676
7. Click **Connect**. Complete the sign-in process.
7777
8. In the **Object Explorer**, expand the **Databases** folder.
78-
9. Right-click on a user database and click **New query**.
78+
9. Right-click on a user database and select **New query**.
7979
10. In the query window, enter the following line, and click **Execute** in the toolbar:
8080

8181
> [!NOTE]
@@ -89,7 +89,7 @@ SQL DB requires unique Azure AD display names. With this, the Azure AD accounts
8989
11. Clear the query window, enter the following line, and click **Execute** in the toolbar:
9090
9191
> [!NOTE]
92-
> `VMName` in the following command is the name of the VM that you enabled system assigned identity on in the prerequsites section.
92+
> `VMName` in the following command is the name of the VM that you enabled system assigned identity on in the prerequisites section.
9393
9494
```sql
9595
ALTER ROLE db_datareader ADD MEMBER [VMName]

0 commit comments

Comments
 (0)