Skip to content

Commit 951562d

Browse files
committed
updating images
1 parent f1528f2 commit 951562d

File tree

5 files changed

+4
-4
lines changed

5 files changed

+4
-4
lines changed
-88.6 KB
Loading
-157 KB
Loading
-54.6 KB
Loading

articles/sql-database/sql-database-aad-authentication-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ Use this method if you are logged into Windows using your Azure Active Directory
458458

459459
![Select AD Integrated Authentication][11]
460460

461-
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. (The **AD domain name or tenant ID**" option is only supported for **Universal with MFA connection** options, otherwise it is greyed out.)
461+
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. For more information, see the article [Multi-factor AAD auth](sql-database-ssms-mfa-authentication.md#azure-ad-domain-name-or-tenant-id-parameter) on the differences between the Connection Properties for SSMS 17.x and 18.x.
462462

463463
![Select the database name][13]
464464

@@ -522,7 +522,7 @@ Learn more about Azure AD authentication methods using the demo code samples ava
522522

523523
## Azure AD token
524524

525-
This authentication method allows middle-tier services to connect to Azure SQL Database or Azure Synapse by obtaining a token from Azure Active Directory (AAD). It enables sophisticated scenarios including certificate-based authentication. You must complete four basic steps to use Azure AD token authentication:
525+
This authentication method allows middle-tier services to obtain [JSON Web Tokens (JWT)](../active-directory/develop/id-tokens.md) to connect to Azure SQL Database or Azure Synapse by obtaining a token from Azure Active Directory (AAD). This method enables various application scenarios including service identities, service principals, and applications using certificate-based authentication. You must complete four basic steps to use Azure AD token authentication:
526526

527527
1. Register your application with Azure Active Directory and get the client ID for your code.
528528
2. Create a database user representing the application. (Completed earlier in step 6.)

articles/sql-database/sql-database-aad-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Azure Active Directory authentication supports the following methods of connecti
133133
- Azure Active Directory Universal with MFA
134134
- Using Application token authentication
135135

136-
The following authentication methods are supported for Azure AD server principals (logins) (**public preview**):
136+
The following authentication methods are supported for Azure AD server principals (logins):
137137

138138
- Azure Active Directory Password
139139
- Azure Active Directory Integrated
@@ -144,7 +144,7 @@ The following authentication methods are supported for Azure AD server principal
144144

145145
- To enhance manageability, we recommend you provision a dedicated Azure AD group as an administrator.
146146
- Only one Azure AD administrator (a user or group) can be configured for an Azure SQL Database server or Azure Synapse at any time.
147-
- The addition of Azure AD server principals (logins) for managed instances (**public preview**) allows the possibility of creating multiple Azure AD server principals (logins) that can be added to the `sysadmin` role.
147+
- The addition of Azure AD server principals (logins) for managed instances allows the possibility of creating multiple Azure AD server principals (logins) that can be added to the `sysadmin` role.
148148
- Only an Azure AD administrator for SQL Server can initially connect to the Azure SQL Database server, managed instance, or Azure Synapse using an Azure Active Directory account. The Active Directory administrator can configure subsequent Azure AD database users.
149149
- We recommend setting the connection timeout to 30 seconds.
150150
- SQL Server 2016 Management Studio and SQL Server Data Tools for Visual Studio 2015 (version 14.0.60311.1April 2016 or later) support Azure Active Directory authentication. (Azure AD authentication is supported by the **.NET Framework Data Provider for SqlServer**; at least version .NET Framework 4.6). Therefore the newest versions of these tools and data-tier applications (DAC and .BACPAC) can use Azure AD authentication.

0 commit comments

Comments
 (0)