Skip to content

Commit c53c76c

Browse files
Merge pull request #294734 from chugugrace/mybranch02172025
update azure ad psh retirement
2 parents 4c2781d + 7fe817f commit c53c76c

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

articles/data-factory/enable-aad-authentication-azure-ssis-ir.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.devlang: powershell
66
ms.topic: conceptual
77
author: chugugrace
88
ms.author: chugu
9-
ms.custom: has-azure-ad-ps-ref
10-
ms.date: 05/15/2024
9+
ms.custom: no-azure-ad-ps-ref
10+
ms.date: 02/17/2025
1111
---
1212

1313
# Enable Microsoft Entra authentication for Azure-SSIS integration runtime
@@ -27,7 +27,7 @@ For more info about the managed identity for your ADF, see [Managed identity for
2727
>
2828
> - To use **connection manager user-assigned managed identity** feature, [OLEDB connection manager](/sql/integration-services/connection-manager/ole-db-connection-manager) for example, SSIS IR needs to be provisioned with the same user-assigned managed identity used in connection manager.
2929
>
30-
> - If you have already created your Azure-SSIS IR using SQL authentication, you can not reconfigure it to use Microsoft Entra authentication via PowerShell at this time, but you can do so via Azure portal/ADF app.
30+
> - If you have already created your Azure-SSIS IR using SQL authentication, you can’t reconfigure it to use Microsoft Entra authentication via PowerShell at this time, but you can do so via Azure portal/ADF app.
3131
3232
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
3333

@@ -41,21 +41,19 @@ Azure SQL Database supports creating a database with a Microsoft Entra user. Fir
4141

4242
### Create a Microsoft Entra group with the specified system/user-assigned managed identity for your ADF as a member
4343

44-
You can use an existing Microsoft Entra group or create a new one using Azure AD PowerShell.
44+
You can use an existing Microsoft Entra group or create a new one using Microsoft Entra PowerShell.
4545

46-
1. Install the [Azure AD PowerShell](/powershell/azure/active-directory/install-adv2) module.
46+
1. Install the [Microsoft Entra PowerShell](/powershell/entra-powershell/installation) module.
4747

48-
2. Sign in using `Connect-AzureAD`, run the following cmdlet to create a group, and save it in a variable:
48+
2. Sign in using `Connect-Entra`, run the following cmdlet to create a group, and save it in a variable:
4949

5050
```powershell
51-
$Group = New-AzureADGroup -DisplayName "SSISIrGroup" `
51+
$Group = New-EntraGroup -DisplayName "SSISIrGroup" `
5252
-MailEnabled $false `
5353
-SecurityEnabled $true `
5454
-MailNickName "NotSet"
5555
```
5656

57-
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
58-
5957
The result looks like the following example, which also displays the variable value:
6058

6159
```powershell
@@ -66,16 +64,16 @@ You can use an existing Microsoft Entra group or create a new one using Azure AD
6664
6de75f3c-8b2f-4bf4-b9f8-78cc60a18050 SSISIrGroup
6765
```
6866

69-
3. Add the specified system/user-assigned managed identity for your ADF to the group. You can follow the [Managed identity for Data Factory or Azure Synapse](./data-factory-service-identity.md) article to get the Object ID of specified system/user-assigned managed identity for your ADF (e.g. aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb, but do not use the Application ID for this purpose).
67+
3. Add the specified system/user-assigned managed identity for your ADF to the group. You can follow the [Managed identity for Data Factory or Azure Synapse](./data-factory-service-identity.md) article to get the Object ID of specified system/user-assigned managed identity for your ADF (for example, aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb, but don't use the Application ID for this purpose).
7068

7169
```powershell
72-
Add-AzureAdGroupMember -ObjectId $Group.ObjectId -RefObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
70+
Add-EntraGroupMember -GroupId $Group.ObjectId -MemberId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
7371
```
7472

7573
You can also check the group membership afterwards.
7674

7775
```powershell
78-
Get-AzureAdGroupMember -ObjectId $Group.ObjectId
76+
Get-EntraGroupMember -GroupId $Group.ObjectId
7977
```
8078

8179
<a name='configure-azure-ad-authentication-for-azure-sql-database'></a>
@@ -108,7 +106,7 @@ For this next step, you need [SSMS](/sql/ssms/download-sql-server-management-st
108106

109107
3. In the **Authentication** field, select **Active Directory - Universal with MFA support** (you can also use the other two Active Directory authentication types, see [Configure and manage Microsoft Entra authentication for Azure SQL Database](/azure/azure-sql/database/authentication-aad-configure)).
110108

111-
4. In the **User name** field, enter the name of Microsoft Entra account that you set as the server administrator, e.g. [email protected].
109+
4. In the **User name** field, enter the name of Microsoft Entra account that you set as the server administrator, for example, [email protected].
112110

113111
5. Select **Connect** and complete the sign-in process.
114112

@@ -168,7 +166,7 @@ For this next step, you need [SSMS](/sql/ssms/download-sql-server-management-st
168166

169167
1. Start SSMS.
170168

171-
2. Connect to Azure SQL Managed Instance using SQL Server account that is a **sysadmin**. This is a temporary limitation that will be removed once the support for Microsoft Entra server principals (logins) on Azure SQL Managed Instance becomes generally available. You will see the following error if you try to use a Microsoft Entra admin account to create the login: *Msg 15247, Level 16, State 1, Line 1 User does not have permission to perform this action*.
169+
2. Connect to Azure SQL Managed Instance using SQL Server account that is a **sysadmin**. This is a temporary limitation that will be removed once the support for Microsoft Entra server principals (logins) on Azure SQL Managed Instance becomes generally available. You'll see the following error if you try to use a Microsoft Entra admin account to create the login: *Msg 15247, Level 16, State 1, Line 1 User doesn't have permission to perform this action*.
172170

173171
3. In the **Object Explorer**, expand the **Databases** -> **System Databases** folder.
174172

@@ -209,7 +207,7 @@ To provision your Azure-SSIS IR with PowerShell, do the following things:
209207

210208
1. Install [Azure PowerShell](https://github.com/Azure/azure-powershell/releases/tag/v5.5.0-March2018) module.
211209

212-
2. In your script, do not set `CatalogAdminCredential` parameter. For example:
210+
2. In your script, don't set `CatalogAdminCredential` parameter. For example:
213211
214212
```powershell
215213
Set-AzDataFactoryV2IntegrationRuntime -ResourceGroupName $ResourceGroupName `

0 commit comments

Comments
 (0)