Skip to content

Commit 2212537

Browse files
Merge pull request #267992 from da5is/patch-2
Update how-to-configure-sign-in-azure-ad-authentication.md
2 parents 509caff + bb0c74a commit 2212537

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -183,12 +183,12 @@ To connect by using a Microsoft Entra token with PgAdmin, follow these steps:
183183

184184
Here are some essential considerations when you're connecting:
185185

186-
- `[email protected]` is the display name of the Microsoft Entra user.
186+
- `[email protected]` is the userPrincipalName of the Microsoft Entra user.
187187
- Be sure to use the exact way the Azure user is spelled. Microsoft Entra user and group names are case-sensitive.
188188
- If the name contains spaces, use a backslash (`\`) before each space to escape it.
189189
You can use the Azure CLI to get the signed in user and set the value for `PGUGSER` environment variable:
190190
```bash
191-
export PGUSER=$(az ad signed-in-user show --query "[displayName]" -o tsv | sed 's/ /\\ /g')
191+
export PGUSER=$(az ad signed-in-user show --query "[userPrincipalName]" -o tsv | sed 's/ /\\ /g')
192192
```
193193
- The access token's validity is 5 minutes to 60 minutes. You should get the access token before initiating the sign-in to Azure Database for PostgreSQL.
194194

0 commit comments

Comments
 (0)