Skip to content

Commit fe46456

Browse files
authored
Update readme.md
1 parent f7eeea2 commit fe46456

File tree

1 file changed

+4
-6
lines changed
  • samples/features/security/azure-active-directory-auth

1 file changed

+4
-6
lines changed

samples/features/security/azure-active-directory-auth/readme.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,12 @@ TODO: Other Prerequisites
3939
- Assuming this application is a daemon/service and not a web application, it doesn't have a sign-in URL or app ID URI. For these two fields, enter http://mytokentest
4040
- While still in the Azure portal, click the Configure tab of your application.
4141
- Find the Client ID value and copy it aside, you will need this later when configuring your application ( i.e. a4bbfe26-dbaa-4fec-8ef5-223d229f647d /see the snapshot below/)
42-
4342
![active directory portal Client ID image](img/azure-active-directory-application-portal.png)
4443

45-
2. Logon to your Azure SQL Server’s user database as an Azure AD admin and using a T-SQL command
46-
provision a contained database user for your application principal:
47-
```sql
48-
CREATE USER [mytokentest] FROM EXTERNAL PROVIDER
49-
```
44+
2. Logon to your Azure SQL Server’s user database as an Azure AD admin and using a T-SQL command provision a contained database user for your application principal:
45+
```sql
46+
CREATE USER [mytokentest] FROM EXTERNAL PROVIDER
47+
```
5048
- [See this link](https://azure.microsoft.com/en-us/documentation/articles/sql-database-aad-authentication/) for more details on how to create an Azure Ad admin and a contained database user.
5149

5250
3. On the machine you are going to run the project on, generate and install a self-signed certificate.

0 commit comments

Comments
 (0)