Skip to content

Commit f25bf01

Browse files
authored
Merge pull request #223196 from MicrosoftDocs/ShawnJackson-patch-1
edit pass: Revert recent changes to access-policies-prerequisites-azure-sql-db.md
2 parents 67018b2 + 43f54ca commit f25bf01

File tree

1 file changed

+7
-12
lines changed

1 file changed

+7
-12
lines changed

articles/purview/includes/access-policies-prerequisites-azure-sql-db.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 12/01/2022
88
ms.custom: references_regions
99
---
1010

11-
Create a new SQL database, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create a SQL database](/azure/azure-sql/database/single-database-create-quickstart).
11+
Create a new Azure SQL Database instance, or use an existing one, in one of the currently available regions for this preview feature. You can follow [this guide to create an Azure SQL Database instance](/azure/azure-sql/database/single-database-create-quickstart).
1212

1313
#### Region support
1414
All [Microsoft Purview regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=purview) are supported.
@@ -31,21 +31,16 @@ Enforcement of Microsoft Purview policies is available only in the following reg
3131
- East Asia
3232
- Australia East
3333

34-
#### Configure the SQL database for policies from Microsoft Purview
35-
For the logical server to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin:
34+
#### Configure the Azure SQL Database instance for policies from Microsoft Purview
35+
For the logical server associated with Azure SQL Database to honor policies from Microsoft Purview, you need to configure an Azure Active Directory admin. In the Azure portal, go to the logical server that hosts the Azure SQL Database instance. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
3636

37-
1. In the Azure portal, go to the logical server that hosts the SQL database.
37+
![Screenshot that shows the assignment of an Active Directory admin to a logical server associated with Azure SQL Database.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
3838

39-
1. On the side menu, select **Azure Active Directory**. Set an admin name to any Azure Active Directory user or group that you prefer, and then select **Save**.
39+
Then, on the side menu, select **Identity**. Under **System assigned managed identity**, turn the status to **On**, and then select **Save**.
4040

41-
![Screenshot shows the assignment of an Active Directory admin to a logical server.](../media/how-to-policies-data-owner-sql/assign-active-directory-admin-azure-sql-db.png)
41+
![Screenshot that shows the assignment of a system-assigned managed identity to a logical server associated with Azure SQL Database.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
4242

43-
1. On the side menu, select **Identity**. Under **System assigned managed identity**, turn the status to **On**. Then select **Save**.
44-
45-
![Screenshot that shows the assignment of a system-assigned managed identity to a logical server.](../media/how-to-policies-data-owner-sql/assign-identity-azure-sql-db.png)
46-
47-
48-
You also need to enable (and verify) external policy-based authorization on the logical server. You can do this in PowerShell:
43+
You also need to enable (and verify) external policy-based authorization on the logical server associated with Azure SQL Database. You can do this in PowerShell:
4944

5045
```powershell
5146
Connect-AzAccount -UseDeviceAuthentication -TenantId xxxx-xxxx-xxxx-xxxx-xxxx -SubscriptionId xxxx-xxxx-xxxx-xxxx

0 commit comments

Comments
 (0)