Starting with version 7.3.1.10, the Azure SQL and SQL Server cartridges support Multi-Factor Authentication (MFA) for connections to Azure SQL Databases and Azure Managed Instances using ActiveDirectoryDefault authentication. This enhancement allows secure, token-based authentication through the Azure CLI.
Login to Azure CLI: Open a terminal on the FglAM machine and run:
This will open a browser window prompting the user to authenticate.
Successful Login Message: After authentication, the CLI will display:
Token Generation:
az login
command generates:
Once logged in, the user can monitor Azure SQL or Managed Instances using the ActiveDirectoryDefault authentication method in Foglight. ActiveDirectoryDefault authentication mode from Agent Properties is mapped to "Microsoft Entra Default" if you add the agent using the Wizard.
Important: If the user needs to connect to a different database or tenant not previously accessed, they must re-authenticate by running az login
again to acquire a new token.
az login
.
MFA Login Fails:
az login
to refresh tokens.az sql db show --name <database-name> --server <server-name> --resource-group <resource-group>
az account get-access-token
Access Denied Errors: