-
-
Notifications
You must be signed in to change notification settings - Fork 808
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to fetch User Permissions from AzureSQL #5076
Comments
Maybe it's the same issue that I have with another cmdlet #5122 , because the way which DBATools connects to the instance (connecting to the default DB and then switching to the -Database) doesn't work with Azure SQL DB |
Be aware that we do not actively support Azure SQL in every command. Commands that we have using strictly SMO are not (on average) going to all work against Azure SQL because SMO is not supported for it. Azure SQL is commonly managed by Az module, Azure CLI and the REST API. This command is going to be an example @Ayanmullick where it will never work on Azure SQL because we are querying DMVs that are not allowed in Azure SQL. To gather permissions for a given user we are querying the |
@wsmelton I verified with our MS TAM. SMO is MS-supported on AzSQLdb. |
On this command it is irrelevant as this command as-is will not support use against Azure SQL. |
The below will connect you to an AzSQLdb thru SMO
|
We don't provide plain text passwords on the module... Not allowed and PS gallery will flag it if we do. To support that it requires use of pscredential object, not providing a custom connection string (unless it can be done without passing a plain text passwords). The main internal connect command will have to be modified if SMO indeed supports it. |
we were planning on support for azure integrated auth, it seems like fun, i'll see what i can do tonight. |
@potatoqualitee be aware that fixing the auth issue will not fix this command for Azure SQL. As stated above this command, |
Thank you @wsmelton. It is true, the underlying T-SQL code, as provided by DISA, does not support this type of permission export. We can now authenticate to Azure SQL Db using various auths, and SMO does work (albeit in a limited capacity, by design) but DISA's T-SQL does not support Azure. If that changes, we'll add it to this command. |
Before submitting a bug report:
powershell -NoProfile
)Steps to Reproduce
Expected Behavior
Actual Behavior
Environmental data
The text was updated successfully, but these errors were encountered: