Skip to content

Commit a654bc7

Browse files
Merge pull request #226263 from kabharati/patch-40
Update how-to-configure-sign-in-azure-ad-authentication.md
2 parents a8cfa5a + e5fdcb3 commit a654bc7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/postgresql/flexible-server/how-to-configure-sign-in-azure-ad-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ If the service principal exists, you'll see the following output.
5858
```output
5959
ObjectId AppId DisplayName
6060
-------- ----- -----------
61-
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 Azure OSSRDBMS PostgreSQL Flexible Server
61+
0049e2e2-fcea-4bc4-af90-bdb29a9bbe98 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9 FSPG MS Graph App
6262
```
6363

6464
> [!IMPORTANT]
@@ -232,7 +232,7 @@ You're now authenticated to your Azure Database for PostgreSQL server through Az
232232
To enable an Azure AD group to access your database, use the same mechanism you used for users, but specify the group name instead. For example:
233233

234234
```sql
235-
select * from pgAzure ADauth_create_principal('Prod DB Readonly', false, false).
235+
select * from pgaadauth_create_principal('Prod DB Readonly', false, false).
236236
```
237237

238238
When group members sign in, they use their access tokens but specify the group name as the username.

0 commit comments

Comments
 (0)