Skip to content

Commit be02562

Browse files
committed
edits per PR reviewer
1 parent 3610c04 commit be02562

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/sql-database/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -760,7 +760,7 @@
760760
- name: Add managed instance to a failover group
761761
href: sql-database-managed-instance-failover-group-tutorial.md
762762
- name: Migrate on-premises users and groups
763-
href: sql-database-managed-instance-aad-migration-tutorial.md
763+
href: tutorial-managed-instance-azure-active-directory-migration.md
764764

765765
- name: Concepts
766766
items:

articles/sql-database/sql-database-managed-instance-aad-migration-tutorial.md renamed to articles/sql-database/tutorial-managed-instance-azure-active-directory-migration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.reviewer: vanto
1111
ms.date: 10/22/2019
1212
---
1313

14-
# Tutorial: Migrating SQL Server on-premises Windows users and groups to Azure SQL Database managed instance using T-SQL DDL syntax
14+
# Tutorial: Migrate SQL Server on-premises Windows users and groups to Azure SQL Database managed instance using T-SQL DDL syntax
1515

1616
> [!NOTE]
1717
> The syntax used to migrate users and groups to managed instance in this article is in **public preview**.
@@ -308,7 +308,7 @@ Test authenticating to managed instance using the user previously mapped to the
308308
1. Log into the federated VM using your MI subscription as `aadsqlmi\testUser1`
309309
1. Using SQL Server Management Studio (SSMS), sign into your managed instance using **Active Directory Integrated** authentication, connecting
310310
to the database `migration`.
311-
1. You can also sign in using the testUser1@aadsqlmi.net credentials with the SSMS option **Active Directory – Universal with MFA support**. However, in this case, you can't use the Single Sign On mechanism and you must type a password. You won't need to use a federated VM to log into your managed instance.
311+
1. You can also sign in using the testUser1@aadsqlmi.net credentials with the SSMS option **Active Directory – Universal with MFA support**. However, in this case, you can't use the Single Sign On mechanism and you must type a password. You won't need to use a federated VM to log in to your managed instance.
312312
1. As part of the role member **SELECT**, you can select from the `test` table
313313

314314
```sql
@@ -330,9 +330,9 @@ Test authenticating to a managed instance using a member of a Windows group `mig
330330

331331
> [!NOTE]
332332
> Due to a known design issue for Azure SQL DB, a create a table statement executed as a member of a group will fail with the following error: </br> </br>
333-
`Msg 2760, Level 16, State 1, Line 4
333+
> `Msg 2760, Level 16, State 1, Line 4
334334
The specified schema name "[email protected]" either does not exist or you do not have permission to use it.` </br> </br>
335-
The current workaround is to create a table with an existing schema in the case above <dbo.new>
335+
> The current workaround is to create a table with an existing schema in the case above <dbo.new>
336336

337337
## Next steps
338338

0 commit comments

Comments
 (0)