Skip to content

Commit cf97ee0

Browse files
committed
Acrolynx fixes
1 parent c3292dc commit cf97ee0

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/cosmos-db/postgresql/concepts-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Permissions for the `citus` role:
5050
superusers.
5151
* Read all pg\_stat\_\* views and use various statistics-related
5252
extensions--even views or extensions normally visible only to superusers.
53-
* Execute monitoring functions that may take ACCESS SHARE locks on tables,
53+
* Execute monitoring functions that might take ACCESS SHARE locks on tables,
5454
potentially for a long time.
5555
* [Create PostgreSQL extensions](reference-extensions.md).
5656

@@ -105,7 +105,7 @@ Once you've authenticated against the Active Directory, you then retrieve a toke
105105
> [!NOTE]
106106
> Login with the deleted Microsoft Entra ID user can still be done till the token expires (up to 90 minutes from token issuing). If you also remove the user from Azure Cosmos DB for PostgreSQL cluster this access will be revoked immediately.
107107
108-
- Azure Cosmos DB for PostgreSQL matches access tokens to the database role using the user’s unique Microsoft Entra ID user ID, as opposed to using the username. If a Microsoft Entra ID user is deleted and a new user is created with the same name, Azure Cosmos DB for PostgreSQL considers that a different user. Therefore, if a user is deleted from Microsoft Entra ID identificator and a new user is added with the same name the new user would be unable to connect with the existing role.
108+
- Azure Cosmos DB for PostgreSQL matches access tokens to the database role using the user’s unique Microsoft Entra ID user ID, as opposed to using the username. If a Microsoft Entra ID user is deleted and a new user is created with the same name, Azure Cosmos DB for PostgreSQL considers that a different user. Therefore, if a user is deleted from Microsoft Entra ID and a new user is added with the same name the new user would be unable to connect with the existing role.
109109

110110
## Next steps
111111

articles/cosmos-db/postgresql/how-to-configure-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Users need to be allowed to sign in to Azure Cosmos DB for PostgreSQL in the Mic
5252

5353
1. Search for 'Microsoft Entra ID' in Azure portal.
5454
1. Open 'Microsoft Entra ID' service.
55-
1. In the **Overview** section on the **Overview** page of Microsoft Entra ID service search for 'b4fa09d8-5da5-4352-83d9-05c2a44cf431' application ID.
55+
1. In the **Overview** section on the **Overview** page of Microsoft Entra ID service, search for 'b4fa09d8-5da5-4352-83d9-05c2a44cf431' application ID.
5656
1. Choose 'Azure Cosmos DB for PostgreSQL AAD Authentication' enterprise application in the search results.
5757
1. In the Azure Cosmos DB for PostgreSQL AAD Authentication enterprise application, choose 'Properties' page.
5858
1. Set **Enabled for users to sign-in?** to **Yes** and save the change.
@@ -89,7 +89,7 @@ The native PostgreSQL user is created on the coordinator node of the cluster, an
8989

9090
Microsoft Entra ID integration works with standard PostgreSQL client tools like **psql**, which aren't Microsoft Entra ID aware and support only specifying the username and password when you're connecting to PostgreSQL. In such cases, the Microsoft Entra ID token is passed as the password.
9191

92-
We've tested the following clients:
92+
We tested the following clients:
9393

9494
- **psql command line**: Use the `PGPASSWORD` variable to pass the token.
9595
- **Other libpq-based clients**: Examples include common application frameworks and object-relational mappers (ORMs).

0 commit comments

Comments
 (0)