You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/enable-aad-authentication-azure-ssis-ir.md
+12-14Lines changed: 12 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,8 @@ ms.devlang: powershell
6
6
ms.topic: conceptual
7
7
author: chugugrace
8
8
ms.author: chugu
9
-
ms.custom: has-azure-ad-ps-ref
10
-
ms.date: 05/15/2024
9
+
ms.custom: no-azure-ad-ps-ref
10
+
ms.date: 02/17/2025
11
11
---
12
12
13
13
# Enable Microsoft Entra authentication for Azure-SSIS integration runtime
@@ -27,7 +27,7 @@ For more info about the managed identity for your ADF, see [Managed identity for
27
27
>
28
28
> - To use **connection manager user-assigned managed identity** feature, [OLEDB connection manager](/sql/integration-services/connection-manager/ole-db-connection-manager) for example, SSIS IR needs to be provisioned with the same user-assigned managed identity used in connection manager.
29
29
>
30
-
> - If you have already created your Azure-SSIS IR using SQL authentication, you can not reconfigure it to use Microsoft Entra authentication via PowerShell at this time, but you can do so via Azure portal/ADF app.
30
+
> - If you have already created your Azure-SSIS IR using SQL authentication, you can’t reconfigure it to use Microsoft Entra authentication via PowerShell at this time, but you can do so via Azure portal/ADF app.
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
58
-
59
57
The result looks like the following example, which also displays the variable value:
60
58
61
59
```powershell
@@ -66,16 +64,16 @@ You can use an existing Microsoft Entra group or create a new one using Azure AD
66
64
6de75f3c-8b2f-4bf4-b9f8-78cc60a18050 SSISIrGroup
67
65
```
68
66
69
-
3. Add the specified system/user-assigned managed identity for your ADF to the group. You can follow the [Managed identity for Data Factory or Azure Synapse](./data-factory-service-identity.md) article to get the Object ID of specified system/user-assigned managed identity for your ADF (e.g. aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb, but do not use the Application ID for this purpose).
67
+
3. Add the specified system/user-assigned managed identity for your ADF to the group. You can follow the [Managed identity for Data Factory or Azure Synapse](./data-factory-service-identity.md) article to get the Object ID of specified system/user-assigned managed identity for your ADF (for example, aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb, but don't use the Application ID for this purpose).
@@ -108,7 +106,7 @@ For this next step, you need [SSMS](/sql/ssms/download-sql-server-management-st
108
106
109
107
3. In the **Authentication** field, select **Active Directory - Universal with MFA support** (you can also use the other two Active Directory authentication types, see [Configure and manage Microsoft Entra authentication for Azure SQL Database](/azure/azure-sql/database/authentication-aad-configure)).
110
108
111
-
4. In the **User name** field, enter the name of Microsoft Entra account that you set as the server administrator, e.g.[email protected].
109
+
4. In the **User name** field, enter the name of Microsoft Entra account that you set as the server administrator, for example,[email protected].
112
110
113
111
5. Select **Connect** and complete the sign-in process.
114
112
@@ -168,7 +166,7 @@ For this next step, you need [SSMS](/sql/ssms/download-sql-server-management-st
168
166
169
167
1. Start SSMS.
170
168
171
-
2. Connect to Azure SQL Managed Instance using SQL Server account that is a **sysadmin**. This is a temporary limitation that will be removed once the support for Microsoft Entra server principals (logins) on Azure SQL Managed Instance becomes generally available. You will see the following error if you try to use a Microsoft Entra admin account to create the login: *Msg 15247, Level 16, State 1, Line1 User does not have permission to perform this action*.
169
+
2. Connect to Azure SQL Managed Instance using SQL Server account that is a **sysadmin**. This is a temporary limitation that will be removed once the support for Microsoft Entra server principals (logins) on Azure SQL Managed Instance becomes generally available. You'll see the following error if you try to use a Microsoft Entra admin account to create the login: *Msg 15247, Level 16, State 1, Line 1 User doesn't have permission to perform this action*.
172
170
173
171
3. In the **Object Explorer**, expand the **Databases**->**System Databases** folder.
174
172
@@ -209,7 +207,7 @@ To provision your Azure-SSIS IR with PowerShell, do the following things:
0 commit comments