You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: fix inaccurate ActiveDirectoryIntegrated description and improve auth docs
- Revert ActiveDirectoryIntegrated to accurate fallback description
(driver still falls back to DefaultAzureCredential per source comment)
- Add -f (codepage) to unimplemented switches table
- Replace generic auth method descriptions with driver-verified details
including actual env var names and connection parameters
@@ -222,7 +223,7 @@ To use AAD auth, you can use one of two command line switches:
222
223
223
224
`ActiveDirectoryIntegrated`
224
225
225
-
This method uses integrated Windows authentication. On Windows, it uses the current user's credentials. On Linux and macOS, it uses Kerberos authentication (requires a properly configured Kerberos environment).
226
+
This method is not fully implemented in the go-mssqldb driver and currently falls back to `ActiveDirectoryDefault`.
226
227
227
228
`ActiveDirectoryPassword`
228
229
@@ -254,13 +255,13 @@ This method uses the device code flow for authentication. It displays a code tha
254
255
255
256
The following authentication methods are also supported via `--authentication-method`:
256
257
257
-
-`ActiveDirectoryWorkloadIdentity` - For workload identity federation scenarios
258
-
-`ActiveDirectoryClientAssertion` - For client assertion authentication
259
-
-`ActiveDirectoryAzurePipelines` - For Azure Pipelines service connections
260
-
-`ActiveDirectoryEnvironment` - Uses environment variables for authentication
-`ActiveDirectoryServicePrincipalAccessToken` - Uses a pre-obtained access token
263
-
-`SqlPassword` - SQL Server authentication (same as using`-U` and `-P` without `-G`)
258
+
-`ActiveDirectoryWorkloadIdentity` - Uses federated token authentication for Kubernetes or GitHub Actions workloads; optionally provide `client_id@tenant_id` as username and `tokenfilepath` parameter (defaults to `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, `AZURE_FEDERATED_TOKEN_FILE` env vars)
259
+
-`ActiveDirectoryClientAssertion` - Authenticates with a signed JWT assertion instead of a client secret
260
+
-`ActiveDirectoryAzurePipelines` - Authenticates using an Azure Pipelines service connection; requires `client_id@tenant_id` as username, plus `serviceconnectionid` and `systemtoken` connection parameters (or `AZURESUBSCRIPTION_CLIENT_ID`, `AZURESUBSCRIPTION_SERVICE_CONNECTION_ID`, `SYSTEM_ACCESSTOKEN` env vars)
261
+
-`ActiveDirectoryEnvironment` - Selects a credential type automatically based on which `AZURE_*`environment variables are set (client secret, certificate, or username/password)
0 commit comments