You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md
+1-52Lines changed: 1 addition & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,59 +22,8 @@ You can have multiple Azure AD admin users with Azure Database for PostgreSQL -
22
22
23
23
## Prerequisites
24
24
25
-
- An Azure account with an active subscription. If you don't already have one, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
26
-
- One of the following roles: **Global Administrator**, **Privileged Role Administrator**, **Tenant Creator**,**Application Owner**.
27
-
- Installation of the [Azure CLI](/cli/azure/install-azure-cli).
28
25
29
-
## Install the Azure AD PowerShell module
30
-
31
-
The following steps are mandatory to use Azure AD authentication with Azure Database for PostgreSQL - Flexible Server.
32
-
33
-
### Connect to the user's tenant
34
-
35
-
```powershell
36
-
Connect-AzureAD -TenantId <customer tenant id>
37
-
```
38
-
39
-
A successful output looks similar to the following.
<your account> AzureCloud <your tenant Id> <your tenant name>.onmicrosoft.com User
45
-
```
46
-
47
-
Ensure that your Azure tenant has the service principal for the Azure Database for PostgreSQL Flexible Server. This only needs to be done once per Azure tenant. First, check for the existence of the service principal in your tenant with this command. **The ObjectId value is for the Azure Database for PostgreSQL Flexible Server service principal.**
48
-
49
-
> [!NOTE]
50
-
> The following script is an example of a created Azure App Registration you can use for testing. If you want to apply your ids, you need to use your own App Registration object and application id.
If the service principal exists, you'll see the following output.
57
-
58
-
```output
59
-
ObjectId AppId DisplayName
60
-
-------- ----- -----------
61
-
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 FSPG MS Graph App
62
-
```
63
-
64
-
> [!IMPORTANT]
65
-
> If you are not a **Global Administrator**, **Tenant Creator**, or **Application Owner**, you can't proceed past this step.
66
-
67
-
### Create Azure Database for PostgreSQL Flexible Server service principal and grant read access
68
-
69
-
If the Azure Database for PostgreSQL Flexible Server service principal doesn't exist, the following command creates it and grants it read access to your customer tenant to request Graph API tokens for Azure AD validation tasks:
In the preceding command, `5657e26c-cc92-45d9-bc47-9da6cfdb4ed9` is the app ID for Azure Database for PostgreSQL - Flexible Server.
76
-
77
-
### Configure network requirements
26
+
**Configure network requirements**
78
27
79
28
Azure AD is a multitenant application. It requires outbound connectivity to perform certain operations, like adding Azure AD admin groups. Additionally, you need network rules for Azure AD connectivity to work, depending on your network topology:
0 commit comments