niomep.blogg.se

Active directory mfa
Active directory mfa





The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. Result = await authContext.AcquireTokenAsync(parameters.All users have mobile phones and laptops. If (adalException.ErrorCode = AdalError.FailedToAcquireTokenSilently || adalException.ErrorCode = AdalError.InteractionRequired) Result = await authContext.AcquireTokenSilentAsync(parameters.Resource, _clientId) Public override async Task AcquireTokenAsync( parameters)ĪuthenticationContext authContext = new AuthenticationContext(parameters.Authority, new FilesBasedAdalV3TokenCache(".\\Token.dat")) ĪuthContext.CorrelationId = parameters.ConnectionId Ĭase .ActiveDirectoryInteractive:Ĭonsole.WriteLine("In method 'AcquireTokenAsync', case_0 = '.ActiveDirectoryInteractive'.") Public ActiveDirectoryAuthProvider(string clientId) This SO question talks about connecting without the provider and setting the Driver in the connection string SqlConnection con = new SqlConnection("DRIVER= new Uri("") I then saw this about accessing SQL via an Azure application But this is not what I want to do. Initially I tried (based on the new SqlAuthenticationMethod Enum): SqlConnection con = new SqlConnection("Server=tcp: Database=CustomerDB Authentication=Active Directory find an authentication provider for I can use my account and MFA to sign into the server fine using SQL Management studio I was trying to follow this documentation but it doesn't mention anything about Active directory with MFA.

active directory mfa

I have already configured my Azure SQL Server so that I am Server admin, my account also has MFA enabled.







Active directory mfa