Removed guidance suggesting assigning Microsoft Graph permissions to SQL managed identity #10139
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
As noted in https://learn.microsoft.com/en-us/azure/azure-sql/database/authentication-aad-directory-readers-role?view=azuresql#assign-the-directory-readers-role, assigning individual Graph permissions to the managed identity is not sufficient to allow an application user to create another user - the managed identity must have the Directory Readers role instead.
The current wording suggests this is the best way to apply the permissions because the Directory Readers role includes other permissions that are not required, which leads to wasted time trying to get this set up when actually the Directory Readers role is required.