Skip to content

Commit c91691d

Browse files
wjpigottrwestMSFT
authored andcommitted
Update Entra ID authentication proxy instructions
1 parent 06bac71 commit c91691d

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

docs/includes/entra-id-tutorial.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: MikeRayMSFT
33
ms.author: mikeray
4-
ms.date: 04/11/2024
4+
ms.date: 04/04/2025
55
ms.service: sql
66
ms.topic: include
77
---
@@ -45,6 +45,18 @@ In this tutorial, you learn how to:
4545

4646
> [!WARNING]
4747
> Connections authenticated by Microsoft Entra ID are always encrypted. If SQL Server is using a self-signed certificate, you must add `trust server cert = true` in the connection string. SQL Server and Windows authenticated connections don't require encryption, but it is strongly recommended.
48+
>
49+
> SQL Server connects directly to Microsoft Entra ID for authentication. Either [explicit firewall URLs](../sql-server/azure-arc/prerequisites.md#network-requirements-for-enabling-entra-id-authentication) need to be opened for direct access, or use a proxy server. Microsoft Entra ID does not use the Arc Connected Machine Agent proxy for authentication. If the machine requires using a proxy server, Microsoft Entra ID requires that the machine-level WinHTTP proxy is set using the following commands (replace `<http://proxyserver:port>` with the appropriate value):
50+
>
51+
> ```console
52+
> netsh winhttp set proxy proxy-server="<http://proxyserver:port>"
53+
> ```
54+
>
55+
> Microsoft Entra ID authentication does not utililze the Arc agent proxy setting. The Arc Agent proxy can be set using the following commands (replace `<http://proxyserver:port>` with the appropriate value):
56+
>
57+
> ```console
58+
> azcmagent config set proxy.url "<http://proxyserver:port>"
59+
> ```
4860
4961
<a name='create-and-register-an-azure-ad-application'></a>
5062

0 commit comments

Comments
 (0)