Skip to content

Commit 17bae13

Browse files
committed
Merge branch 'release-arcee-ga' of https://github.com/anosov1960/sql-docs-pr into release-arcee-ga
2 parents b160812 + bf86dff commit 17bae13

2 files changed

Lines changed: 5 additions & 3 deletions

File tree

docs/sql-server/azure-arc/connect-at-scale.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,9 @@ Each machine must have [Azure PowerShell](/powershell/azure/install-az-ps) insta
5757
```
5858
5959
> [!NOTE]
60-
> When you create a service principal, your account must be an Owner or User Access Administrator in the subscription that you want to use for onboarding. If you don't have sufficient permissions to create role assignments, the service principal might be created, but it won't be able to onboard machines. The instructions on how to create a custom role are provided in [Required permissions](overview.md#required-permissions).
60+
> - When you create a service principal, your account must be an Owner or User Access Administrator in the subscription that you want to use for onboarding. If you don't have sufficient permissions to create role assignments, the service principal might be created, but it won't be able to onboard machines. The instructions on how to create a custom role are provided in [Required permissions](overview.md#required-permissions).
61+
>
62+
> - The service principal must have *Directory.ReadAll* permissions in Microsoft graph. For instructions how to assign [Directory permissions](/graph/permissions-reference.md#directory-permissions) to a service principal, see [Manage API permissions](/graph/migrate-azure-ad-graph-configure-permissions.md#option-1-use-the-azure-portal-to-find-the-apis-your-organization-uses).
6163
6264
2. Give the service principle permissions to access Microsoft Graph:
6365
```azurepowershell-interactive
@@ -67,7 +69,7 @@ Each machine must have [Azure PowerShell](/powershell/azure/install-az-ps) insta
6769
1. Retrieve the password stored in the `$sp` variable:
6870
6971
```azurepowershell-interactive
70-
$credential = New-Object pscredential -ArgumentList "temp", $sp.Secret
72+
$credential = New-Object pscredential -ArgumentList "temp", $sp.PasswordCredentials.SecretText
7173
$credential.GetNetworkCredential().password
7274
```
7375

docs/sql-server/azure-arc/connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ To assign the *Azure Connected SQL Server Onboarding* role to Arc machine manage
9393

9494
```azurecli
9595
spID=$(az resource list -n <ArcMachineName> --query [*].identity.principalId --out tsv)
96-
az role assignment create --assignee $spID --role 'Azure Connected SQL Server Onboarding ' --scope /subscriptions/<mySubscriptionID>/resourceGroups/<myResourceGroup>
96+
az role assignment create --assignee $spID --role 'Azure Connected SQL Server Onboarding' --scope /subscriptions/<mySubscriptionID>/resourceGroups/<myResourceGroup>
9797
```
9898

9999
To install the SQL Server extension, run:

0 commit comments

Comments
 (0)