Skip to content

Commit 8bdae6e

Browse files
authored
C69502: Replacing non-breaking spaces with regular spaces
Hello @swinarko, Localization team has reported source content issue that causes localized version to have broken/different format compared to en-us version. Please review and merge the proposed file change to fix to target versions. If you make related fix in another PR then share your PR number so we can confirm and close this PR. Many thanks in advance.
1 parent 3290296 commit 8bdae6e

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/data-factory/enable-aad-authentication-azure-ssis-ir.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -70,38 +70,38 @@ You can use an existing Azure AD group or create a new one using Azure AD PowerS
7070
7171
You can [Configure and manage Azure AD authentication with SQL](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure) using the following steps:
7272
73-
1. In Azure portal, select **All services** -> **SQL servers** from the left-hand navigation.
73+
1. In Azure portal, select **All services** -> **SQL servers** from the left-hand navigation.
7474
7575
2. Select your Azure SQL Database server to be configured with Azure AD authentication.
7676
77-
3. In the **Settings** section of the blade, select **Active Directory admin**.
77+
3. In the **Settings** section of the blade, select **Active Directory admin**.
7878
79-
4. In the command bar, select **Set admin**.
79+
4. In the command bar, select **Set admin**.
8080
81-
5. Select an Azure AD user account to be made administrator of the server, and then select **Select.**
81+
5. Select an Azure AD user account to be made administrator of the server, and then select **Select.**
8282
83-
6. In the command bar, select **Save.**
83+
6. In the command bar, select **Save.**
8484
8585
### Create a contained user in Azure SQL Database server representing the Azure AD group
8686
8787
For this next step, you need [Microsoft SQL Server Management Studio](https://docs.microsoft.com/sql/ssms/download-sql-server-management-studio-ssms) (SSMS).
8888
8989
1. Start SSMS.
9090
91-
2. In the **Connect to Server** dialog, enter your Azure SQL Database server name in
92-
the **Server name** field.
91+
2. In the **Connect to Server** dialog, enter your Azure SQL Database server name in
92+
the **Server name** field.
9393
94-
3. In the **Authentication** field, select **Active Directory - Universal with MFA support** (you can also use the other two Active Directory authentication types, see [Configure and manage Azure AD authentication with SQL](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure)).
94+
3. In the **Authentication** field, select **Active Directory - Universal with MFA support** (you can also use the other two Active Directory authentication types, see [Configure and manage Azure AD authentication with SQL](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure)).
9595
96-
4. In the **User name** field, enter the name of Azure AD account that you set as the server administrator, e.g. [email protected].
96+
4. In the **User name** field, enter the name of Azure AD account that you set as the server administrator, e.g. [email protected].
9797
98-
5. select **Connect** and complete the sign-in process.
98+
5. select **Connect** and complete the sign-in process.
9999
100-
6. In the **Object Explorer**, expand the **Databases** -> **System Databases** folder.
100+
6. In the **Object Explorer**, expand the **Databases** -> **System Databases** folder.
101101
102-
7. Right-click on **master** database and select **New query**.
102+
7. Right-click on **master** database and select **New query**.
103103
104-
8. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
104+
8. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
105105
106106
```sql
107107
CREATE USER [SSISIrGroup] FROM EXTERNAL PROVIDER
@@ -117,9 +117,9 @@ For this next step, you need [Microsoft SQL Server Management Studio](https://d
117117
118118
The command should complete successfully, granting the contained user the ability to create a database (SSISDB).
119119
120-
10. If your SSISDB was created using SQL authentication and you want to switch to use Azure AD authentication for your Azure-SSIS IR to access it, right-click on **SSISDB** database and select **New query**.
120+
10. If your SSISDB was created using SQL authentication and you want to switch to use Azure AD authentication for your Azure-SSIS IR to access it, right-click on **SSISDB** database and select **New query**.
121121
122-
11. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
122+
11. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
123123
124124
```sql
125125
CREATE USER [SSISIrGroup] FROM EXTERNAL PROVIDER
@@ -186,9 +186,9 @@ For this next step, you need [Microsoft SQL Server Management Studio](https://d
186186
187187
The command should complete successfully, granting the managed identity for your ADF the ability to create a database (SSISDB).
188188
189-
8. If your SSISDB was created using SQL authentication and you want to switch to use Azure AD authentication for your Azure-SSIS IR to access it, right-click on **SSISDB** database and select **New query**.
189+
8. If your SSISDB was created using SQL authentication and you want to switch to use Azure AD authentication for your Azure-SSIS IR to access it, right-click on **SSISDB** database and select **New query**.
190190
191-
9. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
191+
9. In the query window, enter the following T-SQL command, and select **Execute** on the toolbar.
192192
193193
```sql
194194
CREATE USER [{the managed identity name}] FOR LOGIN [{the managed identity name}] WITH DEFAULT_SCHEMA = dbo

0 commit comments

Comments
 (0)