A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://learn.microsoft.com/en-us/azure/postgresql/flexible-server/concepts-azure-ad-authentication below:

Microsoft Entra Authentication - Azure Database for PostgreSQL

Microsoft Entra authentication is a mechanism of connecting to Azure Database for PostgreSQL by using identities defined in Microsoft Entra ID. With Microsoft Entra authentication, you can manage database user identities and other Microsoft services in a central location, which simplifies permission management.

Benefits of using Microsoft Entra ID include:

How Microsoft Entra ID works in Azure Database for PostgreSQL

The following high-level diagram summarizes how authentication works when you use Microsoft Entra authentication with Azure Database for PostgreSQL. The arrows indicate communication pathways.

  1. Your application can request a token from the Azure Instance Metadata Service identity endpoint.
  2. When you use the client ID and certificate, a call is made to Microsoft Entra ID to request an access token.
  3. A JSON Web Token (JWT) access token is returned by Microsoft Entra ID. Your application sends the access token on a call to your server.
  4. The server validates the token with Microsoft Entra ID.

For the steps to configure Microsoft Entra ID with Azure Database for PostgreSQL, see Configure and sign in with Microsoft Entra ID for Azure Database for PostgreSQL.

Differences between a PostgreSQL administrator and a Microsoft Entra administrator

When you turn on Microsoft Entra authentication for your Microsoft Entra principal as a Microsoft Entra administrator, the account:

The PostgreSQL administrator can create only local password-based users. But the Microsoft Entra administrator has the authority to manage both Microsoft Entra users and local password-based users.

The Microsoft Entra administrator can be a Microsoft Entra user, Microsoft Entra group, service principal, or managed identity. Using a group account as an administrator enhances manageability. It permits the centralized addition and removal of group members in Microsoft Entra ID without changing the users or permissions within the Azure Database for PostgreSQL instance.

You can configure multiple Microsoft Entra administrators concurrently. You can deactivate password authentication to an Azure Database for PostgreSQL instance for enhanced auditing and compliance requirements.

Microsoft Entra administrators that you create via the Azure portal, an API, or SQL have the same permissions as the regular admin user that you created during server provisioning. You manage database permissions for nonadmin Microsoft Entra roles similarly to regular roles.

Connection with Microsoft Entra identities

Microsoft Entra authentication supports the following methods for connecting to a database by using Microsoft Entra identities:

After you authenticate against Active Directory, you retrieve a token. This token acts as your password for signing in.

To configure Microsoft Entra ID with Azure Database for PostgreSQL, follow the steps in Configure and sign in with Microsoft Entra ID for Azure Database for PostgreSQL.

Other considerations

When you use Microsoft Entra authentication with Azure Database for PostgreSQL, keep the following points in mind:

Note

The deleted Microsoft Entra user can still sign in until the token expires (up to 60 minutes from token issuing). If you also remove the user from Azure Database for PostgreSQL, this access is revoked immediately.

Frequently asked questions

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4