Skip to content

Commit 58407b1

Browse files
committed
Update per feedback.
1 parent 17bae13 commit 58407b1

1 file changed

Lines changed: 2 additions & 15 deletions

File tree

docs/sql-server/azure-arc/connect-at-scale.md

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: In this article, you learn different ways of connecting SQL Server
55
author: anosov1960
66
ms.author: sashan
77
ms.reviewer: mikeray
8-
ms.date: 07/30/2021
8+
ms.date: 02/23/2022
99
ms.topic: conceptual
1010
ms.prod: sql
1111
---
@@ -46,26 +46,13 @@ Each machine must have [Azure PowerShell](/powershell/azure/install-az-ps) insta
4646
$sp
4747
```
4848
49-
```output
50-
Secret : System.Security.SecureString
51-
ServicePrincipalNames : {ad9bcd79-be9c-45ab-abd8-80ca1654a7d1, https://Arc-for-servers}
52-
ApplicationId : ad9bcd79-be9c-45ab-abd8-80ca1654a7d1
53-
ObjectType : ServicePrincipal
54-
DisplayName : Hybrid-RP
55-
Id : 5be92c87-01c4-42f5-bade-c1c10af87758
56-
Type :
57-
```
49+
2. Give the service principle permissions to access Microsoft Graph.
5850
5951
> [!NOTE]
6052
> - When you create a service principal, your account must be an Owner or User Access Administrator in the subscription that you want to use for onboarding. If you don't have sufficient permissions to create role assignments, the service principal might be created, but it won't be able to onboard machines. The instructions on how to create a custom role are provided in [Required permissions](overview.md#required-permissions).
6153
>
6254
> - The service principal must have *Directory.ReadAll* permissions in Microsoft graph. For instructions how to assign [Directory permissions](/graph/permissions-reference.md#directory-permissions) to a service principal, see [Manage API permissions](/graph/migrate-azure-ad-graph-configure-permissions.md#option-1-use-the-azure-portal-to-find-the-apis-your-organization-uses).
6355
64-
2. Give the service principle permissions to access Microsoft Graph:
65-
```azurepowershell-interactive
66-
$sp = New-AzADServicePrincipal -DisplayName "Arc-for-servers" -Role <your custom role>
67-
```
68-
6956
1. Retrieve the password stored in the `$sp` variable:
7057
7158
```azurepowershell-interactive

0 commit comments

Comments
 (0)