Skip to content

Commit 23965e3

Browse files
Merge pull request #223332 from kabharati/patch-24
Update how-to-configure-sign-in-azure-ad-authentication.md
2 parents 03108ac + 6aa74e8 commit 23965e3

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,24 @@ The following steps are mandatory to use Azure AD authentication with Azure Data
3838
```powershell
3939
Connect-AzureAD -TenantId <customer tenant id>
4040
```
41+
A successful output will look similar to the following.
42+
43+
```
44+
Account Environment TenantId TenantDomain AccountType
45+
------- ----------- -------- ------------ -----------
46+
[email protected] AzureCloud 456e5515-431d-4a70-874d-bdae2ba97c1d <your tenant name>.onmicrosoft.com User
47+
```
48+
49+
Ensure that your Azure tenant has the service principal for the Azure Database for PostgreSQL Flexible Server. This only needs to be done once per Azure tenant. First, check for the existence of the service principal in your tenant with this command. The specific ObjectId value is for the Azure Database for PostgreSQL Flexible Server service principal.
50+
```
51+
Get-AzureADServicePrincipal -ObjectId 0049e2e2-fcea-4bc4-af90-bdb29a9bbe98
52+
```
53+
If the service principal exists, you'll see the following output.
54+
```
55+
ObjectId AppId DisplayName
56+
-------- ----- -----------
57+
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 Azure OSSRDBMS PostgreSQL Flexible Server
58+
```
4159

4260
### Grant read access
4361

0 commit comments

Comments
 (0)