Skip to content

Commit 4897e49

Browse files
committed
Updated Docs
Updated Docs
1 parent 0a71368 commit 4897e49

File tree

3 files changed

+54
-3
lines changed

3 files changed

+54
-3
lines changed

articles/postgresql/flexible-server/concepts-azure-ad-authentication.md

Lines changed: 54 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
Microsoft Entra authentication is a mechanism of connecting to Azure Database for PostgreSQL flexible server using identities defined in Microsoft Entra ID.
1919
With Microsoft Entra authentication, you can manage database user identities and other Microsoft services in a central location, which simplifies permission management.
2020

21-
Benefits of using Microsoft Entra ID include:
21+
**Benefits of using Microsoft Entra ID include:**
2222

2323
- Authentication of users across Azure Services in a uniform way
2424
- Management of password policies and password rotation in a single place
@@ -27,6 +27,15 @@ Benefits of using Microsoft Entra ID include:
2727
- Microsoft Entra authentication uses PostgreSQL database roles to authenticate identities at the database level
2828
- Support of token-based authentication for applications connecting to Azure Database for PostgreSQL flexible server
2929

30+
31+
**To configure and use Microsoft Entra authentication, use the following process:**
32+
33+
1. Create and populate Microsoft Entra ID with user identities as needed.
34+
2. Optionally associate or change the Active Directory currently associated with your Azure subscription.
35+
3. Create a Microsoft Entra administrator for the Azure Database for PostgreSQL server.
36+
4. Create database users in your database mapped to Microsoft Entra identities.
37+
5. Connect to your database by retrieving a token for a Microsoft Entra identity and logging in.
38+
3039
<a name='azure-active-directory-authentication-single-server-vs-flexible-server'></a>
3140

3241
## Microsoft Entra authentication (Azure Database for PostgreSQL single Server vs Azure Database for PostgreSQL flexible server)
@@ -55,9 +64,11 @@ The following high-level diagram summarizes how authentication works using Micro
5564

5665
Use these steps to configure Microsoft Entra ID with Azure Database for PostgreSQL flexible server [Configure and sign in with Microsoft Entra ID for Azure Database for PostgreSQL - Flexible Server](how-to-configure-sign-in-azure-ad-authentication.md).
5766

58-
## Manage PostgreSQL Access For AD Principals
67+
## Differences Between PostgreSQL Administrator and Microsoft Entra Administrator
68+
69+
When Microsoft Entra authentication is enabled on your Flexible Server and Microsoft Entra principal is added as a **Microsoft Entra administrator** the account not only gets the same privileges as the original **PostgreSQL administrator** but also it can manage other Microsoft Entra ID enabled roles on the server. Unlike the PostgreSQL administrator, who can only create local password-based users, the Microsoft Entra administrator has the authority to manage both Entra users and local password-based users.
5970

60-
When Microsoft Entra authentication is enabled and Microsoft Entra principal is added as a Microsoft Entra administrator the account gets the same privileges as the original PostgreSQL administrator. Only Microsoft Entra administrator can manage other Microsoft Entra ID enabled roles on the server using Azure portal or Database API. The Microsoft Entra administrator sign-in can be a Microsoft Entra user, Microsoft Entra group, Service Principal or Managed Identity. Using a group account as an administrator enhances manageability by allowing you to centrally add and remove group members in Microsoft Entra ID without changing the users or permissions in the Azure Database for PostgreSQL flexible server instance. Multiple Microsoft Entra administrators can be configured at any time and you can optionally disable password authentication to an Azure Database for PostgreSQL flexible server instance for better auditing and compliance needs.
71+
Microsoft Entra administrator can be a Microsoft Entra user, Microsoft Entra group, Service Principal, or Managed Identity. Utilizing a group account as an administrator enhances manageability, as it permits centralized addition and removal of group members in Microsoft Entra ID without changing the users or permissions within the Azure Database for PostgreSQL flexible server instance. Multiple Microsoft Entra administrators can be configured concurrently, and you have the option to deactivate password authentication to an Azure Database for PostgreSQL flexible server instance for enhanced auditing and compliance requirements.
6172

6273
![admin structure][2]
6374

@@ -85,6 +96,7 @@ Once you've authenticated against the Active Directory, you then retrieve a toke
8596
8697
## Other considerations
8798

99+
- Microsoft user assigned tokens are
88100
- Multiple Microsoft Entra principals (a user, group, service principal or managed identity) can be configured as Microsoft Entra Administrator for an Azure Database for PostgreSQL flexible server instance at any time.
89101
- Only a Microsoft Entra administrator for PostgreSQL can initially connect to the Azure Database for PostgreSQL flexible server instance using a Microsoft Entra account. The Active Directory administrator can configure subsequent Microsoft Entra database users.
90102
- If a Microsoft Entra principal is deleted from Microsoft Entra ID, it still remains as PostgreSQL role, but it will no longer be able to acquire new access token. In this case, although the matching role still exists in the database it won't be able to authenticate to the server. Database administrators need to transfer ownership and drop roles manually.
@@ -94,6 +106,45 @@ Once you've authenticated against the Active Directory, you then retrieve a toke
94106
95107
- Azure Database for PostgreSQL flexible server matches access tokens to the database role using the user’s unique Microsoft Entra user ID, as opposed to using the username. If a Microsoft Entra user is deleted and a new user is created with the same name, Azure Database for PostgreSQL flexible server considers that a different user. Therefore, if a user is deleted from Microsoft Entra ID and a new user is added with the same name the new user won't be able to connect with the existing role.
96108

109+
## Frequently asked questions
110+
111+
112+
* **What are different authentication modes available in Azure Database for PostgreSQL Flexible Server?**
113+
114+
Azure Database for PostgreSQL flexible server supports three modes of authentication namely **PostgreSQL authentication only** , **Microsoft Entra authentication only** and **PostgreSQL and Microsoft Entra authentication**
115+
116+
* **Can I configure multiple Microsoft Entra administrators on my Flexible Server?**
117+
118+
Yes. You can configure multiple Entra administrators on your flexible server. During provisioning you can only set a single Microsoft Entra admin but once the server is created you can set as many Microsoft Entra administrators as you want by going to **Authentication** blade.
119+
120+
* **Is Microsoft Entra administrators only a Microsoft Entra user?****
121+
122+
No. Microsoft Entra administrator can be a user, group, service principal or managed identity.
123+
124+
* **Can Microsoft Entra administrator create local password based users?**
125+
126+
Unlike the PostgreSQL administrator, who can only create local password-based users, the Microsoft Entra administrator has the authority to manage both Entra users and local password-based users.
127+
128+
* **What happens when i enable Microsoft Entra Authentication on my flexible server?**
129+
130+
When Microsoft Entra Authentication is set at the server level, PGAadAuth extension gets enabled and results in a server restart.
131+
132+
* **how do i login using Microsoft Entra Authentication?**
133+
134+
You can use client tools such as psql,pgadmin etc to login to your flexible server. Please use the Microsoft Entra ID as **User name** and use your **Entra token**as your password which is generated using azlogin.
135+
136+
* **How do i generate my token**
137+
Please use below steps to generate your token.
138+
[Generate Token](how-to-configure-sign-in-azure-ad-authentication.md)
139+
140+
* **What is the difference between group login and individual login?**
141+
142+
The only difference between logging in as **Microsoft Entra group member** and individual **Entra user** lies in the **Username**, while logging in as individual user you provide your individual Entra ID where as you'll utilize the group name while logging as group member.Regardless, in both scenarios, you'll employ the same individual Entra token as the password.
143+
144+
* **What is the token lifetime**
145+
146+
User tokens are valid upto 1 hour where as System Assigned Managed Identity tokens are valid upto 24 hours.
147+
97148

98149
## Next steps
99150

Loading
23.4 KB
Loading

0 commit comments

Comments
 (0)