Skip to content

Commit e5d0a99

Browse files
committed
Edits5
1 parent 8bf96ce commit e5d0a99

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

articles/app-service/tutorial-connect-msi-azure-database.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -303,17 +303,17 @@ Yes. For more information, see:
303303
- [Microsoft Entra authentication for SQL Server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview)
304304
- [Enable Microsoft Entra authentication for SQL Server on Azure VMs](/azure/azure-sql/virtual-machines/windows/configure-azure-ad-authentication-for-sql-vm)
305305
306-
#### I get the error `Login failed for user '<token-identified principal>'.`
306+
### I get the error `Login failed for user '<token-identified principal>'.`
307307
308308
The managed identity you're attempting to request a token for isn't authorized to access the Azure database.
309309
310-
#### I made changes to App Service authentication or the associated app registration. Why do I still get the old token?
310+
### I made changes to App Service authentication or the associated app registration. Why do I still get the old token?
311311
312312
The back-end services of managed identities also [maintain a token cache](overview-managed-identity.md#configure-target-resource) that updates the token for a target resource only when it expires. If you modify the configuration *after* trying to get a token with your app, you don't actually get a new token with the updated permissions until the cached token expires. The best way to work around this is to test your changes with a new InPrivate (Edge)/private (Safari)/Incognito (Chrome) window. That way, you're sure to start from a new authenticated session.
313313
314314
<a name='how-do-i-add-the-managed-identity-to-an-azure-ad-group'></a>
315315
316-
#### How do I add the managed identity to a Microsoft Entra group?
316+
### How do I add the managed identity to a Microsoft Entra group?
317317
318318
If you want, you can add the identity to a [Microsoft Entra group](/entra/fundamentals/concept-learn-about-groups), then grant access to the Microsoft Entra group instead of the identity. For example, the following commands add the managed identity from the previous step to a new group called *myAzureSQLDBAccessGroup*:
319319
@@ -326,14 +326,14 @@ az ad group member list -g $groupid
326326

327327
To grant database permissions for a Microsoft Entra group, see documentation for the respective database type.
328328

329-
#### I get the error `SSL connection is required. Please specify SSL options and retry`.
329+
### I get the error `SSL connection is required. Please specify SSL options and retry`.
330330

331331
Connecting to the Azure database requires more settings and is beyond the scope of this tutorial. For more information, see one of the following links:
332332

333333
- [Configure TLS connectivity in Azure Database for PostgreSQL - Single Server](/azure/postgresql/security/security-tls-how-to-connect)
334334
- [Configure SSL connectivity in your application to securely connect to Azure Database for MySQL](/azure/mysql/flexible-server/security-tls-how-to-connect)
335335

336-
#### I created my app with the Web App + Database template, and now I can't configure a managed identity connection with the Service Connector commands.
336+
### I created my app with the Web App + Database template, and now I can't configure a managed identity connection with the Service Connector commands.
337337

338338
Service Connector needs network access to the database in order to grant access for the app identity. When you create a secure-by-default app and database architecture in the Azure portal with the Web App + Database template, the architecture locks down network access to the database and only allows connections from within the virtual network. It's also true for Azure Cloud Shell. However, you can [deploy Cloud Shell in the virtual network](../cloud-shell/vnet/deployment.md), then run the Service Connector command in that Cloud Shell.
339339

0 commit comments

Comments
 (0)