Skip to content

Commit 49ce410

Browse files
authored
Merge pull request #227594 from kabharati/patch-46
Update how-to-configure-sign-in-azure-ad-authentication.md
2 parents 29d9065 + cbbbdbd commit 49ce410

File tree

1 file changed

+1
-52
lines changed

1 file changed

+1
-52
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 1 addition & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -22,59 +22,8 @@ You can have multiple Azure AD admin users with Azure Database for PostgreSQL -
2222

2323
## Prerequisites
2424

25-
- An Azure account with an active subscription. If you don't already have one, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
26-
- One of the following roles: **Global Administrator**, **Privileged Role Administrator**, **Tenant Creator**,**Application Owner**.
27-
- Installation of the [Azure CLI](/cli/azure/install-azure-cli).
2825

29-
## Install the Azure AD PowerShell module
30-
31-
The following steps are mandatory to use Azure AD authentication with Azure Database for PostgreSQL - Flexible Server.
32-
33-
### Connect to the user's tenant
34-
35-
```powershell
36-
Connect-AzureAD -TenantId <customer tenant id>
37-
```
38-
39-
A successful output looks similar to the following.
40-
41-
```output
42-
Account Environment TenantId TenantDomain AccountType
43-
------- ----------- -------- ------------ -----------
44-
<your account> AzureCloud <your tenant Id> <your tenant name>.onmicrosoft.com User
45-
```
46-
47-
Ensure that your Azure tenant has the service principal for the Azure Database for PostgreSQL Flexible Server. This only needs to be done once per Azure tenant. First, check for the existence of the service principal in your tenant with this command. **The ObjectId value is for the Azure Database for PostgreSQL Flexible Server service principal.**
48-
49-
> [!NOTE]
50-
> The following script is an example of a created Azure App Registration you can use for testing. If you want to apply your ids, you need to use your own App Registration object and application id.
51-
52-
```powershell
53-
Get-AzureADServicePrincipal -ObjectId 97deb67a-332c-456a-9ef4-3a95eb59c74b
54-
```
55-
56-
If the service principal exists, you'll see the following output.
57-
58-
```output
59-
ObjectId AppId DisplayName
60-
-------- ----- -----------
61-
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 FSPG MS Graph App
62-
```
63-
64-
> [!IMPORTANT]
65-
> If you are not a **Global Administrator**, **Tenant Creator**, or **Application Owner**, you can't proceed past this step.
66-
67-
### Create Azure Database for PostgreSQL Flexible Server service principal and grant read access
68-
69-
If the Azure Database for PostgreSQL Flexible Server service principal doesn't exist, the following command creates it and grants it read access to your customer tenant to request Graph API tokens for Azure AD validation tasks:
70-
71-
```powershell
72-
New-AzureADServicePrincipal -AppId 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9
73-
```
74-
75-
In the preceding command, `5657e26c-cc92-45d9-bc47-9da6cfdb4ed9` is the app ID for Azure Database for PostgreSQL - Flexible Server.
76-
77-
### Configure network requirements
26+
**Configure network requirements**
7827

7928
Azure AD is a multitenant application. It requires outbound connectivity to perform certain operations, like adding Azure AD admin groups. Additionally, you need network rules for Azure AD connectivity to work, depending on your network topology:
8029

0 commit comments

Comments
 (0)