You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/includes/entra-id-tutorial.md
+40-16Lines changed: 40 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,38 +110,62 @@ Select the newly created application, and on the left side menu, select **API Pe
110
110
111
111
:::image type="content" source="../relational-databases/security/authentication-access/media/upload-certificate-to-application.png" alt-text="Screenshot of certificate and secrets menu in the Azure portal." lightbox="../relational-databases/security/authentication-access/media/upload-certificate-to-application.png":::
112
112
113
-
1. In the Azure portal, navigate to the Azure Key Vault instance where the certificate is stored, and select **Access policies** from the navigation menu.
113
+
1. In the Azure portal, get the object ID of the Azure Arc Machine.
114
114
115
-
1. Select **Create**.
116
-
1. For **Secret permissions**, select **Get** and **List**.
117
-
1. For **Certificate permissions**, select **Get** and **List**.
118
-
1. Select **Next**.
119
-
1. On the **Principal** page, search for the name of your Machine - Azure Arc instance, which is the hostname of the SQL Server host.
115
+
1. Under **Azure Arc Resources**>**Machines**, select the machine.
116
+
1. In **Overview**, find **JSON View**.
117
+
1. Under **Identity**, copy the value for **principalId**.
120
118
121
-
:::image type="content" source="../relational-databases/security/authentication-access/media/machine-azure-arc-resource.png" alt-text="Screenshot of Azure Arc server resource in portal.":::
119
+
:::image type="content" source="../relational-databases/security/authentication-access/media/machine-azure-arc-json-view.png" alt-text="Screenshot of portal control of JSON view of machine definition.":::
122
120
123
-
1. Skip the **Application (optional)** page by selecting **Next** twice, or selecting **Review + create**.
121
+
1. In the portal, navigate to the Azure Key Vault instance where the certificate is stored, and grant access to the Azure Machine resource(s). In your Azure Key Vault navigation menu, navigate to **Settings**, and **Access configuration**. For detailed steps to manage role assignments, review [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
122
+
123
+
Your experience depends on your key vault access configuration:
124
124
125
-
Verify that the "Object ID" of the **Principal** matches the **Principal ID** of the managed identity assigned to the instance.
125
+
To use **Azure role-based access control (recommended)**:
126
126
127
-
:::image type="content" source="../relational-databases/security/authentication-access/media/customer-managed-akv-review-create.png" alt-text="Screenshot of Azure portal to review and create access policy."
127
+
1. Add the following roles to your Resource.
128
128
129
-
To confirm, go to the resource page and select **JSON View** in the top right of the Essentials box on the Overview page. Under **identity** you'll find the **principalId**
129
+
- Key Vault Certificate User
130
+
- Key Vault Secrets User
130
131
131
-
:::image type="content" source="../relational-databases/security/authentication-access/media/machine-azure-arc-json-view.png" alt-text="Screenshot of portal control of JSON view of machine definition.":::
132
+
1. Verify the roles in this location:
132
133
134
+
:::image type="content" source="../relational-databases/security/authentication-access/media/add-rbac-roles-on-key-vault.png" alt-text="Screenshot of Azure Key Vault IAM role additions.":::
135
+
136
+
To use **Vault access policy**:
137
+
138
+
1. Select **Access policies** from the navigation menu.
133
139
1. Select **Create**.
140
+
1. For **Secret permissions**, select **Get**>**List**.
141
+
1. For **Certificate permissions**, select **Get**>**List**.
142
+
1. Select **Next**.
143
+
1. For **Principal** page, search for the name of your **Machine - Azure Arc** instance, which is the hostname of the SQL Server host.
134
144
135
-
You must select **Create** to ensure that the permissions are applied. To ensure permissions have been stored, refresh the browser window, and check that the row for your Azure Arc instance is still present.
145
+
:::image type="content" source="../relational-databases/security/authentication-access/media/machine-azure-arc-resource.png" alt-text="Screenshot of Azure Arc server resource in portal. ":::
146
+
147
+
1. Select **Review + create**.
148
+
1. Verify that the value for **Principal**>**Object ID** matches the **Principal ID** of the managed identity assigned to the instance.
149
+
150
+
:::image type="content" source="../relational-databases/security/authentication-access/media/customer-managed-akv-review-create.png" alt-text="Screenshot of Azure portal to review and create access policy."
151
+
152
+
To confirm, go to the resource page and select **JSON View** in the top right of the Essentials box on the Overview page. Under **identity** you'll find the **principalId**
153
+
154
+
1. Select **Create**.
136
155
137
-
:::image type="content" source="../relational-databases/security/authentication-access/media/add-access-policy-on-key-vault.png" alt-text="Screenshot of adding access policy to the key vault in the Azure portal.":::
156
+
You must select **Create**to ensure that the permissions are applied. To ensure permissions have been stored, refresh the browser window, and confirm that your Azure Arc instance is present.
## Configure Microsoft Entra authentication for SQL Server through Azure portal
142
161
143
162
> [!NOTE]
144
-
> Using the [Azure CLI](../relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial.md?tabs=azure-cli#setting-up-the-azure-ad-admin-for-the-sql-server), [PowerShell](../relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial.md?tabs=azure-powershell#setting-up-the-azure-ad-admin-for-the-sql-server), or [ARM template](../relational-databases/security/authentication-access/azure-ad-authentication-sql-server-automation-setup-tutorial.md?tabs=arm-template#setting-up-the-azure-ad-admin-for-the-sql-server) to set up a Microsoft Entra admin for SQL Server is available.
163
+
>
164
+
> You can configure Microsoft Entra authentication with any of the following experiences:
Copy file name to clipboardExpand all lines: docs/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Tutorial on how to set up Microsoft Entra authentication for SQL Se
0 commit comments