Skip to content

Commit ec8ce99

Browse files
Merge pull request #266832 from kabharati/patch-181
Update how-to-manage-azure-ad-users.md
2 parents 9a7ef01 + dd2c98e commit ec8ce99

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

articles/postgresql/flexible-server/how-to-manage-azure-ad-users.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If you like to learn about how to create and manage Azure subscription users and
2828
## Create or delete Microsoft Entra administrators using Azure portal or Azure Resource Manager (ARM) API
2929

3030
1. Open the **Authentication** page for your Azure Database for PostgreSQL flexible server instance in the Azure portal.
31-
1. To add an administrator - select **Add Microsoft Entra Admin** and select a user, group, application or a managed identity from the current Microsoft Entra tenant.
31+
1. To add an administrator - select **Add Microsoft Entra Admin** and select a user, group, application, or a managed identity from the current Microsoft Entra tenant.
3232
1. To remove an administrator - select **Delete** icon for the one to remove.
3333
1. Select **Save** and wait for provisioning operation to completed.
3434

@@ -42,7 +42,7 @@ If you like to learn about how to create and manage Azure subscription users and
4242

4343
## Manage Microsoft Entra roles using SQL
4444

45-
Once first Microsoft Entra administrator is created from the Azure portal or API, you can use the administrator role to manage Microsoft Entra roles in your Azure Database for PostgreSQL flexible server instance.
45+
Once the first Microsoft Entra administrator is created from the Azure portal or API, you can use the administrator role to manage Microsoft Entra roles in your Azure Database for PostgreSQL flexible server instance.
4646

4747
We recommend getting familiar with [Microsoft identity platform](../../active-directory/develop/v2-overview.md) for best use of Microsoft Entra integration with Azure Database for PostgreSQL flexible server.
4848

@@ -86,6 +86,14 @@ For example: select * from pgaadauth_create_principal('[email protected]', false,
8686

8787
<a name='create-a-role-using-azure-ad-object-identifier'></a>
8888

89+
## Drop a role using Microsoft Entra principal name
90+
91+
Remember that any Microsoft Entra role that is created in PostgreSQL must be dropped using a Microsoft Entra Admin. If you use a regular PostgreSQL admin to drop an Entra role then it will result in an error.
92+
93+
```sql
94+
Drop Role rolename;
95+
```
96+
8997
## Create a role using Microsoft Entra object identifier
9098

9199
```sql

0 commit comments

Comments
 (0)