Skip to content

Commit bdb4223

Browse files
authored
Apply suggestions from code review
Corrected three occurrences of Microsoft Entra
1 parent b65c6b3 commit bdb4223

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

azure-sql/database/elastic-jobs-tsql-create-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The elastic job agent must be able to authenticate to each target server or data
4747

4848
### Use Microsoft Entra authentication with a UMI for job execution
4949

50-
To use the recommended method of Microsoft Entra (formerly Azure Active Directory) authentication to a user-assigned managed identity (UMI), follow these steps. The elastic job agent connects to the desired target logical server(s)/databases(s) via Entra authentication.
50+
To use the recommended method of Microsoft Entra (formerly Azure Active Directory) authentication to a user-assigned managed identity (UMI), follow these steps. The elastic job agent connects to the desired target logical server(s)/databases(s) via Microsoft Entra authentication.
5151

5252
In addition to the login and database users, note the addition of the `GRANT` commands in the following script. These permissions are required for the script we chose for this example job. Your jobs might require different permissions. Because the example creates a new table in the targeted databases, the database user in each target database needs the proper permissions to successfully run.
5353

@@ -128,7 +128,7 @@ GRANT CREATE TABLE TO job_credential;
128128
Create a contained database user if a login is not needed on the logical server. Typically you would only do this if you have a single database to manage with this elastic job agent.
129129

130130
```sql
131-
--Create a contained database user on a user database mapped to an Entra account
131+
--Create a contained database user on a user database mapped to a Microsoft Entra account
132132
CREATE USER [job_credential] WITH PASSWORD='<Enter_same_StrongPassword_as_database_scoped_credential>';
133133

134134
-- Grant permissions as necessary to execute your jobs. For example, ALTER and CREATE TABLE:

azure-sql/database/elastic-jobs-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Use [Microsoft Entra (formerly Azure Active Directory)](authentication-aad-overv
8181
You can use a database-scoped credential in the job database and in each target server/database for authentication. In the past, database-scoped credentials were the only option available with elastic jobs.
8282

8383
> [!NOTE]
84-
> If a UMI is assigned to the Job Agent, SQL Authentication will not be used to connect to its targets. Job Agent will only use Entra authentication with the UMI to connect to all of its target databases.
84+
> If a UMI is assigned to the Job Agent, SQL Authentication will not be used to connect to its targets. Job Agent will only use Microsoft Entra authentication with the UMI to connect to all of its target databases.
8585
8686
1. Create a database-scoped credential in the *job database*.
8787
1. Use [PowerShell to create a database-scoped credential](elastic-jobs-powershell-create.md#create-the-job-credentials)

0 commit comments

Comments
 (0)