Skip to content

Commit 6aa74e8

Browse files
authored
Update how-to-configure-sign-in-azure-ad-authentication.md
Updated validation
1 parent 1382513 commit 6aa74e8

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,24 @@ The following steps are mandatory to use Azure AD authentication with Azure Data
3838
```powershell
3939
Connect-AzureAD -TenantId <customer tenant id>
4040
```
41+
A successful output will look similar to the following.
42+
43+
```
44+
Account Environment TenantId TenantDomain AccountType
45+
------- ----------- -------- ------------ -----------
46+
[email protected] AzureCloud 456e5515-431d-4a70-874d-bdae2ba97c1d <your tenant name>.onmicrosoft.com User
47+
```
48+
49+
Ensure that your Azure tenant has the service principal for the Azure Database for PostgreSQL Flexible Server. This only needs to be done once per Azure tenant. First, check for the existence of the service principal in your tenant with this command. The specific ObjectId value is for the Azure Database for PostgreSQL Flexible Server service principal.
50+
```
51+
Get-AzureADServicePrincipal -ObjectId 0049e2e2-fcea-4bc4-af90-bdb29a9bbe98
52+
```
53+
If the service principal exists, you'll see the following output.
54+
```
55+
ObjectId AppId DisplayName
56+
-------- ----- -----------
57+
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 Azure OSSRDBMS PostgreSQL Flexible Server
58+
```
4159

4260
### Grant read access
4361

0 commit comments

Comments
 (0)