Skip to content

Commit 59cf93e

Browse files
authored
Merge pull request #79793 from cephalin/issue32934
#32934
2 parents 0af8811 + 8f584d1 commit 59cf93e

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

articles/app-service/app-service-web-tutorial-connect-msi.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,15 @@ az sql server ad-admin create --resource-group myResourceGroup --server-name <se
8080

8181
The managed identity now has access to your Azure SQL Database server.
8282

83+
> [!IMPORTANT]
84+
> For simplicity, this step configures the Azure AD managed identity as the SQL Database administrator. The method has the following limitations:
85+
>
86+
> - The app's administrative access doesn't follow security best practices.
87+
> - Since the managed identity is app specific, you can't use the same managed identity to connect to SQL Database from another app.
88+
> - The managed identity can't sign in to the SQL Database interactively, so it's impossible to grant access to managed identities of additional apps.
89+
>
90+
> To improve security and to administrate Azure AD accounts in SQL Database, follow the steps at [Grant minimal privileges to identity](#grant-minimal-privileges-to-identity).
91+
8392
## Modify connection string
8493

8594
Modify the connection you set previously for your app, using the [`az webapp config appsettings set`](/cli/azure/webapp/config/appsettings?view=azure-cli-latest#az-webapp-config-appsettings-set) command in the Cloud Shell. In the following command, replace *\<app name>* with the name of your app, and replace *\<server_name>* and *\<db_name>* with the ones for your SQL Database.

0 commit comments

Comments
 (0)