
3 - Networking RequirementsĪzure Active Directory is a multi-tenant application and requires outbound connectivity to perform certain operations like adding Azure AD admin groups. AppID (5657e26c-cc92-45d9-bc47-9da6cfdb4ed9) in the above command is the AppID for Azure Database for PostgreSQL Flexible Server Service. This command grants Azure Database for PostgreSQL Flexible Server Service Principal read access to customer tenant to request Graph API tokens for Azure AD validation tasks. 1 - Connect to the user tenant Connect-AzureAD -TenantId Ģ - Grant Flexible Server Service Principal read access to customer tenant New-AzureADServicePrincipal -AppId 5657e26c-cc92-45d9-bc47-9da6cfdb4ed9


The following steps are mandatory to use Azure Active Directory authentication with Azure Database for PostgreSQL Flexible Server. One of the following roles: Global Administrator, Privileged Role Administrator, Tenant Administrator.If you don't already have one, Create an account for free. An Azure account with an active subscription.Install AzureAD PowerShell: AzureAD Module Prerequisites You can now have multiple Azure AD admin users with flexible server, and Azure AD admin users can be either a user, a group, or a service principal. We recommend not using the Azure AD administrator for regular database operations, as it has elevated user permissions (for example, CREATEDB).

Only Azure AD administrator users can create/enable users for Azure AD-based authentication.
Setting up tableplus with postgres how to#
In this article, you'll configure Azure Active Directory (Azure AD) access and how to connect using an Azure AD token with Azure Database for PostgreSQL Flexible Server.Īzure Active Directory Authentication for Azure Database for PostgreSQL Flexible Server can be configured either during server provisioning or later. Azure Active Directory Authentication for PostgreSQL Flexible Server is currently in preview.
