Skip to content

Commit 4837252

Browse files
Update how-to-configure-sign-in-azure-ad-authentication.md
The documentation is misleading regarding the read access command. The command really creates/inserts the service principal into the customer tenant. Also, the role **Privileged Role Administrator** doesn't have the permissions. This was found out in support ticket TrackingID#2301270040005465
1 parent 02b6cd1 commit 4837252

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ ObjectId AppId Displa
6262
```
6363

6464
> [!IMPORTANT]
65-
> If you are not a **Global Administrator**, **Privileged Role Administrator**, **Tenant Creator**,**Application Owner** you can't proceed past this step.
65+
> If you are not a **Global Administrator**, **Tenant Creator**,**Application Owner** you can't proceed past this step.
6666
67-
### Grant read access
67+
### Create Azure Database for PostgreSQL Flexible Server service principal and grant read access
6868

69-
Grant Azure Database for PostgreSQL - Flexible Server Service Principal read access to a customer tenant to request Graph API tokens for Azure AD validation tasks:
69+
If the Azure Database for PostgreSQL Flexible Server service principal doesn't exist, the following command creates it and grants it read access to your customer tenant to request Graph API tokens for Azure AD validation tasks:
7070

7171
```powershell
7272
New-AzureADServicePrincipal -AppId 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9

0 commit comments

Comments
 (0)