Skip to content

Commit 2a926ca

Browse files
committed
Last set of fixes
1 parent 5c7aa48 commit 2a926ca

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/cosmos-db/postgresql/concepts-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,9 @@ Benefits of using Microsoft Entra ID include:
7171

7272
### Manage PostgreSQL access for Microsoft Entra ID principals
7373

74-
When Microsoft Entra ID authentication is enabled and Microsoft Entra ID principal is added as a Microsoft Entra ID administrator, the account gets the same privileges as [the `citus` role](#the-citus-role). The Microsoft Entra ID administrator sign-in can be a Microsoft Entra ID user, Service Principal or Managed Identity. Multiple Microsoft Entra ID administrators can be configured at any time and you can optionally disable PostgreSQL (password) authentication to the Azure Cosmos DB for PostgreSQL cluster for better auditing and compliance needs.
74+
When Microsoft Entra ID authentication is enabled and Microsoft Entra ID principal is added as a Microsoft Entra ID administrator, the account gets the same privileges as [the `citus` role](#the-citus-role). The Microsoft Entra ID administrator sign-in can be a Microsoft Entra ID user, Service Principal, or Managed Identity. Multiple Microsoft Entra ID administrators can be configured at any time and you can optionally disable PostgreSQL (password) authentication to the Azure Cosmos DB for PostgreSQL cluster for better auditing and compliance needs.
7575

76-
Additionally, any number of non-admin Microsoft Entra ID roles can be added to a cluster at any time once Microsoft Entra ID authentication is enabled. Database permissions for non-admin Microsoft Entra ID roles are managed similar to regular roles.
76+
Additionally, any number of nonadmin Microsoft Entra ID roles can be added to a cluster at any time once Microsoft Entra ID authentication is enabled. Database permissions for nonadmin Microsoft Entra ID roles are managed similar to regular roles.
7777

7878
<a name='connect-using-azure-ad-identities'></a>
7979

articles/cosmos-db/postgresql/how-to-configure-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ az login
102102

103103
The command opens a browser window to the Microsoft Entra ID authentication page. It requires you to give your Microsoft Entra ID user name and password.
104104

105-
The user account name you use to authenticate (e.g. [email protected]) is the one the access token will be generated for in the next step.
105+
The user account name you use to authenticate (for example, [email protected]) is the one the access token will be generated for in the next step.
106106

107107
<a name='retrieve-the-azure-ad-access-token'></a>
108108

@@ -111,7 +111,7 @@ The user account name you use to authenticate (e.g. [email protected])
111111
Use the Azure CLI to acquire an access token for the Microsoft Entra ID authenticated user to access Azure Cosmos for PostgreSQL. Here's an example:
112112

113113
```azurecli-interactive
114-
az account get-access-token --resource https://postgres.cosmos.azure.com
114+
az account get-access-token --resource https://token.postgres.cosmos.azure.com
115115
```
116116

117117
After authentication is successful, Microsoft Entra ID returns an access token for current Azure subscription:

0 commit comments

Comments
 (0)