Skip to content

Commit 35f401e

Browse files
authored
Changed AAD to Azure AD in two places
1 parent 9d57679 commit 35f401e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sql-database/create-auditing-storage-account-vnet-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The sample scripts in this section require you to update the script before you r
7474

7575
To configure SQL Audit to write events to a storage account behind a VNet or Firewall:
7676

77-
1. Register your Azure SQL Database server with Azure Active Directory (AAD). Use either PowerShell or REST API.
77+
1. Register your Azure SQL Database server with Azure Active Directory (Azure AD). Use either PowerShell or REST API.
7878

7979
**PowerShell**
8080

@@ -108,7 +108,7 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
108108
}
109109
```
110110

111-
2. Open [Azure portal](https://portal.azure.com). Navigate to your storage account. Locate **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL database that you registered with Azure Active Directory (AAD) as in the previous step.
111+
2. Open [Azure portal](https://portal.azure.com). Navigate to your storage account. Locate **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL database that you registered with Azure Active Directory (Azure AD) as in the previous step.
112112

113113
> [!NOTE]
114114
> Only members with Owner privilege can perform this step. For various built-in roles for Azure resources, refer to [Azure built-in roles](../role-based-access-control/built-in-roles.md).

0 commit comments

Comments
 (0)