Skip to content

Commit 5f2dd7e

Browse files
Update how-to-manage-azure-ad-users.md
1 parent 0258df2 commit 5f2dd7e

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/postgresql/flexible-server/how-to-manage-azure-ad-users.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,9 @@ pg_catalog.pgaadauth_create_principal(roleName text, isAdmin boolean, isMfa bool
9494
##### `isMfa`
9595
`boolean` when `true` it enforces Multi Factor Authentication for this PostgreSQL user.
9696

97+
> [!IMPORTANT]
98+
> The `isMfa` flag tests the `mfa` claim in the Microsoft Entra ID token, but it doesn't impact the token acquisition flow. For example, if the tenant of the principal is not configured for Multi Factor Authentication, it will prevent the use of the feature. And if the tenant requires Multi Factor Authentication for all tokens, it will make this flag useless.
99+
97100
#### Return type
98101

99102
`text` single value that consists of a string "Created role for ***roleName***", where ***roleName*** is the argument passed for the **roleName** parameter.
@@ -161,6 +164,10 @@ SECURITY LABEL for "pgaadauth" on role "<roleName>" is 'aadauth,oid=<objectId>,t
161164

162165
`text` it can be set to `user`, `group`, or `service` (for applications or managed identities connecting under their own service credentials).
163166

167+
##### `admin`
168+
169+
`text` it can be present or absent. Users/roles for which this part is present in their security label, can manage other Microsoft Entra ID roles.
170+
164171
## Next steps
165172

166173
- Review the overall concepts for [Microsoft Entra authentication with Azure Database for PostgreSQL - Flexible Server](concepts-azure-ad-authentication.md)

0 commit comments

Comments
 (0)