Skip to content

Commit 81a90a0

Browse files
authored
changed files by pdets auto publish service, publishid[21e9f8d6-bf51-435e-9321-d9374ac041b3] and do [publish].
1 parent 1078869 commit 81a90a0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

learn-pr/wwl-azure/security-azure-sql-database-azure-sql-managed-instance/includes/3-authorize-database-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ A federated domain user account that is imported into a managed domain as an ext
195195

196196
### Naming considerations
197197

198-
Special characters like colon : or ampersand & when included as user names in the T-SQL CREATE LOGIN and CREATE USER statements aren't supported.
198+
Special characters like colon: or ampersand & when included as user names in the T-SQL CREATE LOGIN and CREATE USER statements aren't supported.
199199

200200
Microsoft Entra ID and Azure SQL diverge in their user management design in one key way: Microsoft Entra ID allows display names to be duplicated within a tenant, whereas Azure SQL requires all server principals on a server or instance and all database principals on a database to have a unique name. Because Azure SQL directly uses the Microsoft Entra display name of the identity when creating principals, this can result in errors when creating users. To solve this issue, Azure SQL has released the WITH OBJECT\_ID enhancement currently in preview, which allows users to specify the Microsoft Entra object ID of the identity being added to the server or instance.
201201

0 commit comments

Comments
 (0)