Skip to content

Commit c989ddf

Browse files
authored
Merge pull request #263537 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 80e83f5 + a499921 commit c989ddf

File tree

3 files changed

+15
-4
lines changed

3 files changed

+15
-4
lines changed

articles/api-management/authentication-authorization-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Examples:
123123

124124
* [Configure credential manager - Microsoft Graph API](credentials-how-to-azure-ad.md)
125125
* [Configure credential manager - GitHub API](credentials-how-to-github.md)
126-
* [Configure credential manager - user delegated access to backend APIs](credentials-how-to-github.md)
126+
* [Configure credential manager - user delegated access to backend APIs](credentials-how-to-user-delegated.md)
127127

128128
## Other options to secure APIs
129129

articles/postgresql/flexible-server/how-to-connect-with-managed-identity.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,16 +49,27 @@ az ad sp list --display-name vm-name --query [*].appId --out tsv
4949

5050
## Create an Azure Database for PostgreSQL flexible server user for your Managed Identity
5151

52-
Now, connect as the Microsoft Entra administrator user to your Azure Database for PostgreSQL flexible server database, and run the following SQL statements, replacing `CLIENT_ID` with the client ID you retrieved for your system-assigned managed identity:
52+
Now, connect as the Microsoft Entra administrator user to your Azure Database for PostgreSQL flexible server database, and run the following SQL statements, replacing `<identity_name>` with the name of the resources for which you created a system-assigned managed identity:
5353

5454
```sql
5555
select * from pgaadauth_create_principal('<identity_name>', false, false);
5656
```
5757

58+
Success looks like:
59+
```sql
60+
pgaadauth_create_principal
61+
-----------------------------------
62+
Created role for "<identity_name>"
63+
(1 row)
64+
```
65+
5866
For more information on managing Microsoft Entra ID enabled database roles, see [how to manage Microsoft Entra ID enabled Azure Database for PostgreSQL - Flexible Server roles](./how-to-manage-azure-ad-users.md)
5967

6068
The managed identity now has access when authenticating with the identity name as a role name and the Microsoft Entra token as a password.
6169

70+
> [!Note]
71+
> If the managed identity is not valid, an error is returned: `ERROR: Could not validate AAD user <ObjectId> because its name is not found in the tenant. [...]`.
72+
6273
## Retrieve the access token from the Azure Instance Metadata service
6374

6475
Your application can now retrieve an access token from the Azure Instance Metadata service and use it for authenticating with the database.
@@ -92,7 +103,7 @@ You're now connected to the database you configured earlier.
92103

93104
This section shows how to get an access token using the VM's user-assigned managed identity and use it to call Azure Database for PostgreSQL flexible server. Azure Database for PostgreSQL flexible server natively supports Microsoft Entra authentication, so it can directly accept access tokens obtained using managed identities for Azure resources. When creating a connection to Azure Database for PostgreSQL flexible server, you pass the access token in the password field.
94105

95-
Here's a .NET code example of opening a connection to Azure Database for PostgreSQL flexible server using an access token. This code must run on the VM to use the system-assigned managed identity to obtain an access token from Microsoft Entra ID. Replace the values of HOST, USER, DATABASE, and CLIENT_ID.
106+
Here's a .NET code example of opening a connection to Azure Database for PostgreSQL flexible server using an access token. This code must run on the VM to use the system-assigned managed identity to obtain an access token from Microsoft Entra ID. Replace the values of HOST, USER (with `<identity_name>`), and DATABASE.
96107

97108
```csharp
98109
using System;

articles/virtual-machines/linux/how-to-resize-encrypted-lvm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ When you need to add a new disk to increase the VG size, extend your traditional
202202
![Screenshot showing the code that checks the disk list. The results are highlighted.](./media/disk-encryption/resize-lvm/009-resize-lvm-scenariob-check-scsi12.png)
203203

204204
```bash
205-
sudo lsbk
205+
sudo lsblk
206206
```
207207

208208
![Screenshot showing the code that checks the disk list by using l s b l k. The command and the result are highlighted.](./media/disk-encryption/resize-lvm/009-resize-lvm-scenariob-check-lsblk1.png)

0 commit comments

Comments
 (0)