You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn about how to use Azure Active Directory for authentication with Azure SQL Database, Azure SQL Managed Instance, and Synapse SQL in Azure Synapse Analytics
This article provides an overview of using Azure Active Directory to authenticate to [Azure SQL Database](sql-database-paas-overview.md), [Azure SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md), [SQL Server on Windows Azure VMs](../virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview.md), [Synapse SQL in Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) and [SQL Server for Windows and Linux](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview) by using identities in Azure AD.
@@ -50,13 +50,13 @@ With Azure AD authentication, you can centrally manage the identities of databas
50
50
The configuration steps include the following procedures to configure and use Azure Active Directory authentication.
51
51
52
52
1. Create and populate Azure AD.
53
-
2. Optional: Associate or change the active directory that is currently associated with your Azure Subscription.
54
-
3. Create an Azure Active Directory administrator.
55
-
4. Configure your client computers.
56
-
5. Create contained database users in your database mapped to Azure AD identities.
57
-
6. Connect to your database by using Azure AD identities.
53
+
1. Optional: Associate or change the active directory that is currently associated with your Azure Subscription.
54
+
1. Create an Azure Active Directory administrator.
55
+
1. Configure your client computers.
56
+
1. Create contained database users in your database mapped to Azure AD identities.
57
+
1. Connect to your database by using Azure AD identities.
58
58
59
-
> [!NOTE]
59
+
> [!NOTE]
60
60
> For Azure SQL, Azure VMs and SQL Server 2022, Azure AD authentication only supports access tokens which originate from Azure AD and doesn't support third-party access tokens. Azure AD also doesn't support redirecting Azure AD queries to third-party endpoints. This applies to all SQL platforms and all operating systems that support Azure AD authentication.
61
61
62
62
## Trust architecture
@@ -85,8 +85,8 @@ When using Azure AD authentication, there are two Administrator accounts: the or
85
85
86
86
![admin structure][3]
87
87
88
-
> [!NOTE]
89
-
> Azure AD authentication with Azure SQL supports only a single Azure AD tenant where the Azure SQL resource currently resides. All Azure AD objects from this tenant can be set up as users allowing access to Azure SQL in this tenant. Only an Azure AD admin from this tenant can be configured to enable access to Azure SQL in this tenant . Azure AD multi-tenant authentication accessing Azure SQL from different tenants are not supported. Multi-tenant Azure AD admins cannot be set up for an Azure SQL resource.
88
+
> [!NOTE]
89
+
> Azure AD authentication with Azure SQL supports only a single Azure AD tenant where the Azure SQL resource currently resides. All Azure AD objects from this tenant can be set up as users allowing access to Azure SQL in this tenant. Only an Azure AD admin from this tenant can be configured to enable access to Azure SQL in this tenant . Azure AD multi-tenant authentication accessing Azure SQL from different tenants are not supported. Multi-tenant Azure AD admins cannot be set up for an Azure SQL resource.
90
90
91
91
## Permissions
92
92
@@ -103,7 +103,6 @@ To create a contained database user in Azure SQL Database, Azure SQL Managed Ins
103
103
- Imported members from other Azure ADs who are native or federated domain members.
104
104
- Active Directory groups created as security groups.
105
105
106
-
107
106
- Azure AD users that are part of a group that is member of the `db_owner` database role cannot use the **[CREATE DATABASE SCOPED CREDENTIAL](/sql/t-sql/statements/create-database-scoped-credential-transact-sql)** syntax against Azure SQL Database and Azure Synapse. You'll see the following error:
108
107
109
108
`SQL Error [2760] [S0001]: The specified schema name 'user@mydomain.com' either doesn't exist or you do not have permission to use it.`
@@ -118,6 +117,10 @@ To create a contained database user in Azure SQL Database, Azure SQL Managed Ins
118
117
-`SUSER_ID(<name>)`
119
118
-`SUSER_SID(<name>)`
120
119
120
+
- Azure SQL Database doesn't create implicit users for users logged in as part of an Azure AD group membership. Because of this, various operations that require assigning ownership will fail, even if the Azure AD group is added as a member to a role with those permissions.
121
+
122
+
For example, a user signed into a database via an Azure AD group with the **db_ddladmin** role, will not be able to execute CREATE SCHEMA, ALTER SCHEMA, and other object creation statements without a schema explicitly defined (such as table, view, or type, for example). To resolve this, an Azure AD user must be created for that user, or the Azure AD group must be altered to assign the DEFAULT_SCHEMA to **dbo**.
123
+
121
124
### SQL Managed Instance
122
125
123
126
- Azure AD server principals (logins) and users are supported for [SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md).
0 commit comments