You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/azure-data-studio/azure-connectivity.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: "overview"
10
10
---
11
11
# Azure Data Studio - Azure connectivity
12
12
13
-
Azure Data Studio uses the Microsoft Authentication Library (MSAL) by default to acquire an access token from Microsoft Entra ID. The settings that apply to Azure authentication are discussed, along with commonly observed issues and their solutions.
13
+
Azure Data Studio uses the Microsoft Authentication Library (MSAL) by default to acquire an access token from Azure Active Directory. The settings that apply to Azure authentication are discussed, along with commonly observed issues and their solutions.
14
14
15
15
## Azure: Authentication library
16
16
@@ -64,7 +64,7 @@ When both options are checked, users are prompted to select one of the two authe
64
64
65
65
## Azure account configuration
66
66
67
-
Azure Data Studio supports Microsoft Entra authentication with National clouds. **Azure Public Cloud** is enabled by default, but users can enable other national clouds as needed:
67
+
Azure Data Studio supports Azure Active Directory (Azure AD) authentication with National clouds. **Azure Public Cloud** is enabled by default, but users can enable other national clouds as needed:
68
68
69
69
`Settings.json`
70
70
@@ -197,7 +197,7 @@ Azure Data Studio's default behavior includes validating system's root CA certif
197
197
"http.systemCertificates": true
198
198
```
199
199
200
-
If a system's Root CA certificate is expired, authentication requests to Microsoft Entra ID will fail and an error like below would be captured in 'Azure Account' logs:
200
+
If a system's Root CA certificate is expired, authentication requests to Azure Active Directory will fail and an error like below would be captured in 'Azure Account' logs:
201
201
202
202
`error: certificate is expired`
203
203
@@ -249,7 +249,7 @@ This setting disables system keychain integration to prevent repeated keychain a
249
249
250
250
## Clear Azure account token cache
251
251
252
-
Azure Data Studio maintains a cache of access tokens to prevent the throttling of token requests to Microsoft Entra ID. It's possible that Azure Data Studio's token cache may be outdated, which requires cleaning up expired access tokens from the application cache.
252
+
Azure Data Studio maintains a cache of access tokens to prevent the throttling of token requests to Azure Active Directory (Azure AD). It's possible that Azure Data Studio's token cache may be outdated, which requires cleaning up expired access tokens from the application cache.
253
253
254
254
Execute this command from **Command Palette (Ctrl/CMD + Shift + P)** to clear access tokens for linked Azure accounts:
255
255
@@ -259,4 +259,4 @@ Execute this command from **Command Palette (Ctrl/CMD + Shift + P)** to clear ac
259
259
260
260
Execute this command from **Command Palette (Ctrl/CMD + Shift + P)** to remove all linked Azure accounts from Azure Data Studio:
Copy file name to clipboardExpand all lines: docs/azure-data-studio/connect.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ After a user upgrades to Azure Data Studio 1.44 and higher, the initial launch o
22
22
--change this below
23
23
:::image type="content" source="connect/connect-update-after-upgrade-no-tenant.png" alt-text="Screenshot of message about tenant list box removal after upgrading Azure Data Studio.":::
24
24
25
-
With the Sql Authentication Provider, selection of a tenant is no longer required. The Microsoft Entra tenant list box has been removed from the Connection dialog because it's now handled by the underlying driver. This change also allows for improved token refresh for Azure SQL Database connections.
25
+
With the Sql Authentication Provider, selection of a tenant is no longer required. The Azure AD tenant list box has been removed from the Connection dialog because it's now handled by the underlying driver. This change also allows for improved token refresh for Azure SQL Database connections.
26
26
27
27
The **Mssql: Enable Sql Authentication Provider** option can be disabled within **File** > **Preferences** > **Settings**.
Copy file name to clipboardExpand all lines: docs/azure-data-studio/extensions/mysql-extension.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ With the MySQL extension for Azure Data Studio, you can now connect to, query an
16
16
The Azure Data Studio functionality available for MySQL includes:
17
17
18
18
- Connection manager, allowing you to connect to any MySQL server hosted on-premises, on virtual machines, on managed MySQL in other clouds, and on Azure Database for MySQL – Flexible Server.
19
-
- Option to choose your preferred authentication method (MySQL native authentication and Microsoft Entra authentication)
19
+
- Option to choose your preferred authentication method (MySQL native authentication and Azure Active Directory authentication)
20
20
- Searchable object explorer view for database objects, with auto-completion
21
21
- Query authoring and editing with Intellisense, syntax highlighting and code snippets
22
22
- Ability to query results and save to csv, JSON, xml, or Excel
Copy file name to clipboardExpand all lines: docs/azure-data-studio/quickstart-azure-cosmos-db-mongodb.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,8 +41,8 @@ To complete this quickstart, you need Azure Data Studio and an Azure Cosmos DB A
41
41
| --- | --- | --- |
42
42
|**Connection type**|*Mongo account*| Set this value to *Mongo account* to use with Azure Cosmos DB API for MongoDB. |
43
43
|**Mongo account**|*\[cosmos-account-name\]*| Name of Azure Cosmos DB account. |
44
-
|**Authentication type**|*Microsoft Entra ID - Universal with MFA support*| Choose between *Microsoft Entra ID* or *Basic* authentication options. |
45
-
|**Account**|*\[current-aad-user-name\]*| Only visible if using *Microsoft Entra ID* authentication. Select the Microsoft Entra account that you wish to use for authentication. |
44
+
|**Authentication type**|*Azure Active Directory - Universal with MFA support*| Choose between *Azure Active Directory* or *Basic* authentication options. |
45
+
|**Account**|*\[current-aad-user-name\]*| Only visible if using *Azure Active Directory* authentication. Select the Azure AD account that you wish to use for authentication. |
46
46
|**Username**|| Only visible if using *Basic* authentication. Enter the username for authentication. |
47
47
|**Connection String**|| Only visible if using *Basic* authentication. Enter the connection string for authentication. |
48
48
|**Server group**|*\<Default\>*||
@@ -53,7 +53,7 @@ To complete this quickstart, you need Azure Data Studio and an Azure Cosmos DB A
53
53
1. Select **Connect**.
54
54
55
55
> [!IMPORTANT]
56
-
> If you selected *Microsoft Entra ID* authentication, you may be prompted to select a MongoDB connection string value to use for your connection.
56
+
> If you selected *Azure Active Directory* authentication, you may be prompted to select a MongoDB connection string value to use for your connection.
57
57
58
58
Your server will open in the **SERVERS** sidebar after you've successfully connected.
59
59
@@ -152,4 +152,4 @@ In this quickstart, you've learned how to create an API for MongoDB account, cre
152
152
- Interested in importing MongoDB data into Azure Cosmos DB? See [Migrate MongoDB to Azure Cosmos DB's API for MongoDB](/azure/cosmos-db/mongodb/tutorial-mongotools-cosmos-db)
153
153
- Trying to do capacity planning for a migration to Azure Cosmos DB? You can use information about your existing database cluster for capacity planning.
154
154
- If all you know is the number of vCores and servers in your existing database cluster, read about [estimating request units using vCores or vCPUs](/azure/cosmos-db/convert-vcore-to-request-unit)
155
-
- If you know typical request rates for your current database workload, read about [estimating request units using Azure Cosmos DB capacity planner](/azure/cosmos-db/sql/estimate-ru-with-capacity-planner)
155
+
- If you know typical request rates for your current database workload, read about [estimating request units using Azure Cosmos DB capacity planner](/azure/cosmos-db/sql/estimate-ru-with-capacity-planner)
|**Server name**| localhost / exampleserver.mysql.database.azure.con | The fully qualified server name. |
42
-
|**Authentication type**| Password | The authentication method for accessing your MySQL server. This option lets you choose between MySQL native authentication (Password) and Microsoft Entra authentication.|
42
+
|**Authentication type**| Password | The authentication method for accessing your MySQL server. This option lets you choose between MySQL native authentication (Password) and Azure Active Directory authentication.|
43
43
|**User name**| exampleuser | The user name you want to sign in with. |
44
44
|**Password**|*password*| The password for the account you're logging in with. |
45
45
|**Remember Password**|*Check*| Check this box if you don't want to enter the password each time you connect. |
Copy file name to clipboardExpand all lines: docs/azure-data-studio/quickstart-sql-database.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Use Azure Data Studio to establish a connection to your Azure SQL Database serve
36
36
37
37

38
38
39
-
2. This article uses SQL sign-in, but for Azure SQL Database, Microsoft Entra Universal MFA authentication is also supported. Fill in the following fields using the server name, user name, and password for your Azure SQL server:
39
+
2. This article uses SQL sign-in, but for Azure SQL Database, Azure AD Universal MFA authentication is also supported. Fill in the following fields using the server name, user name, and password for your Azure SQL server:
Copy file name to clipboardExpand all lines: docs/big-data-cluster/big-data-cluster-faq.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -196,7 +196,7 @@ sections:
196
196
Please refer to the licensing guide which goes into much more detail, [download the PDF](https://aka.ms/sql-bdc-licensing).<BR>For a summary, watch the video [SQL Server Licensing: Big Data Clusters | Data Exposed](https://channel9.msdn.com/Shows/Data-Exposed/SQL-Server-Licensing-Big-Data-Clusters--Data-Exposed).
197
197
- name: Security
198
198
questions:
199
-
- question: Does Big Data Cluster support Microsoft Entra ID?
199
+
- question: Does Big Data Cluster support Azure Active Directory?
200
200
answer: |
201
201
Not at this time.
202
202
- question: Can we connect to Big Data Cluster master using integrated authentication?
@@ -254,4 +254,4 @@ sections:
254
254
(PDF)[Case Study: SQL Workloads running on Apache Spark in MS SQL Server 2019 Big Data Cluster](https://aka.ms/sql-bdc-spark-perf)<BR>
255
255
additionalContent: |
256
256
## See also
257
-
- [SQL Server Big Data Clusters](big-data-cluster-overview.md)
257
+
- [SQL Server Big Data Clusters](big-data-cluster-overview.md)
0 commit comments