Skip to content

Commit 43f54ca

Browse files
authored
Update access-policies-prerequisites-azure-sql-db.md
1 parent fc8c43f commit 43f54ca

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/purview/includes/access-policies-prerequisites-azure-sql-db.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 12/01/2022
88
ms.custom: references_regions
99
---
1010

11-
Create a new SQL database, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create a SQL database](/azure/azure-sql/database/single-database-create-quickstart).
11+
Create a new Azure SQL Database instance, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create an Azure SQL Database instance](/azure/azure-sql/database/single-database-create-quickstart).
1212

1313
#### Region support
1414
All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
@@ -31,16 +31,16 @@ Enforcement of Microsoft Purview policies is available only in the following reg
3131
- East Asia
3232
- Australia East
3333

34-
#### Configure the SQL database for policies from Microsoft Purview
35-
For the logical server to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin. In the Azure portal, go to the logical server that hosts the SQL database. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
34+
#### Configure the Azure SQL Database instance for policies from Microsoft Purview
35+
For the logical server associated with Azure SQL Database to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin. In the Azure portal, go to the logical server that hosts the Azure SQL Database instance. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
3636

37-
![Screenshot that shows the assignment of an Active Directory admin to a logical server.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
37+
![Screenshot that shows the assignment of an Active Directory admin to a logical server associated with Azure SQL Database.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
3838

3939
Then, on the side menu, select **Identity**. Under **System assigned managed identity**, turn the status to **On**, and then select **Save**.
4040

41-
![Screenshot that shows the assignment of a system-assigned managed identity to a logical server.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
41+
![Screenshot that shows the assignment of a system-assigned managed identity to a logical server associated with Azure SQL Database.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
4242

43-
You also need to enable (and verify) external policy-based authorization on the logical server. You can do this in PowerShell:
43+
You also need to enable (and verify) external policy-based authorization on the logical server associated with Azure SQL Database. You can do this in PowerShell:
4444

4545
```powershell
4646
Connect-AzAccount -UseDeviceAuthentication -TenantId xxxx-xxxx-xxxx-xxxx-xxxx -SubscriptionId xxxx-xxxx-xxxx-xxxx

0 commit comments

Comments
 (0)