Skip to content

Commit 740fd26

Browse files
Merge pull request #34765 from PratimDasgupta/docs-editor/managed-identity-1753219169
Update managed-identity.md
2 parents e8c20fe + af17989 commit 740fd26

File tree

1 file changed

+12
-5
lines changed

1 file changed

+12
-5
lines changed

docs/sql-server/azure-arc/managed-identity.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Add the SQL Server service account (default: `NT Service\MSSQLSERVER` or for nam
9292

9393
### Update the registry
9494

95-
> [!WARNING]
95+
> [!WARNING]
9696
> Incorrectly editing the registry can severely damage your system. Before making changes to the registry, we recommend you back up any valued data on the computer.
9797
9898
In the registry, update the **\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server\MSSQL17.MSSQLSERVER\MSSQLServer\FederatedAuthentication** subkey.
@@ -182,9 +182,15 @@ For details, review [How to add, modify, or delete registry subkeys and values b
182182

183183
## Grant application permissions to the identity
184184

185-
The system-assigned managed identity, which uses the Arc-enabled machine name, must have the following Microsoft Graph application permissions (app roles): `User.Read.All`, `GroupMember.Read.All`, and `Application.Read.All`.
185+
> [!IMPORTANT]
186+
> Only a [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) or higher role can grant these permissions.
186187
187-
You can use PowerShell to grant required permissions to the managed identity. Alternatively, you can [create a role-assignable group](/entra/identity/role-based-access-control/groups-create-eligible). After the group is created, assign the **Directory readers** role to the group, and add all system-assigned managed identities for your Arc-enabled machines to the group.
188+
The system-assigned managed identity, which uses the Arc-enabled machine name, must have the following Microsoft Graph application permissions (app roles):
189+
- [User.Read.All](/graph/permissions-reference#user-permissions): Allows access to Microsoft Entra user information.
190+
- [GroupMember.Read.All](/graph/permissions-reference#group-permissions): Allows access to Microsoft Entra group information.
191+
- [Application.Read.ALL](/graph/permissions-reference#application-resource-permissions): Allows access to Microsoft Entra service principal (application) information.
192+
193+
You can use PowerShell to grant required permissions to the managed identity. Alternatively, you can [create a role-assignable group](/entra/identity/role-based-access-control/groups-create-eligible). After the group is created, assign the **Directory readers** role or the `User.Read.All`, `GroupMember.Read.All`, and `Application.Read.All` permissions to the group, and add all system-assigned managed identities for your Azure Arc-enabled machines to the group. We do not recommend using the **Directory Readers** role in your production environment.
188194

189195
The following PowerShell script grants the required permissions to the managed identity. Make sure this script is run on PowerShell 7.5 or a later version, and has the `Microsoft.Graph` module 2.28 or later installed.
190196

@@ -259,9 +265,9 @@ Follow the steps in the [Microsoft Entra tutorial](../../sql-server/azure-arc/en
259265

260266
Consider the following limitations when using a managed identity with SQL Server 2025:
261267

262-
- Microsoft Entra authentication is only supported with Arc enabled SQL Server 2025 running on Windows Server.
268+
- The managed identity setup for Microsoft Entra authentication is only supported with Azure Arc-enabled SQL Server 2025, running on Windows Server.
269+
- SQL Server needs access to Azure public cloud to use [Microsoft Entra authentication](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview).
263270
- Using Microsoft Entra authentication with failover cluster instances isn't supported.
264-
- The identity you choose to authenticate to SQL Server has to have either the **Directory Readers** role in Microsoft Entra ID or the following three Microsoft Graph application permissions (app roles): `User.Read.All`, `GroupMember.Read.All`, and `Application.Read.All`.
265271
- Once Microsoft Entra authentication is enabled, disabling isn't advisable. Disabling Microsoft Entra authentication forcefully by deleting registry entries can result in unpredictable behavior with SQL Server 2025.
266272
- Authenticating to SQL Server on Arc machines through Microsoft Entra authentication using the [FIDO2 method](/azure/active-directory/authentication/howto-authentication-passwordless-faqs) isn't currently supported.
267273
- [OPENROWSET BULK](../../t-sql/functions/openrowset-bulk-transact-sql.md) operations can also read the tokens folder `C:\ProgramData\AzureConnectedMachineAgent\Tokens\`. The `BULK` option requires either `ADMINISTER BULK OPERATIONS` or `ADMINISTER DATABASE BULK OPERATIONS` permissions. These permissions should be treated as equivalent to **[sysadmin](../../relational-databases/security/authentication-access/server-level-roles.md)**.
@@ -271,3 +277,4 @@ Consider the following limitations when using a managed identity with SQL Server
271277
- [Microsoft Entra authentication for SQL Server](../../relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview.md)
272278
- [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
273279
- [Enable Microsoft Entra authentication for SQL Server on Azure VMs](/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm)
280+

0 commit comments

Comments
 (0)