Skip to content

Commit 8c6d665

Browse files
Correct some word errors and add a picture in readme. (Azure#32536)
* Update pic in Azure Identity Extensions. Co-authored-by: Xiaolu Dai <[email protected]>
1 parent 3f373c8 commit 8c6d665

File tree

4 files changed

+13
-4
lines changed

4 files changed

+13
-4
lines changed

sdk/identity/azure-identity-extensions/Azure-Database-for-MySQL-README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ MySQL)[Azure Active Directory for authenticating with MySQL]
143143

144144
### Architecture
145145

146-
This picture shows how the jdbc authentication plugin for MySQL authenticating with MSI.
146+
This picture shows how the jdbc authentication plugin for MySQL authenticating with managed identity.
147147

148148
![mysql_design.png](img/mysql_design.png)
149149

sdk/identity/azure-identity-extensions/Azure-Database-for-PostgreSQL-README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -145,13 +145,13 @@ PostgreSQL)[Use Azure Active Directory for authenticating with PostgreSQL]
145145

146146
### Architecture
147147

148-
This picture shows how the jdbc authentication plugin for PostgreSQl authenticating with MSI.
148+
This picture shows how the jdbc authentication plugin for PostgreSQl authenticating with managed identity.
149149

150150
![postgresql_design.png](img/postgresql_design.png)
151151

152152
1. The JDBC auth plugin will get an access token from Azure AD.
153-
2. The JDBC driver will take the token obtained from step 1 as the password ( `token as password`) to connect with the MySQL server.
154-
3. The MySQL server will check the access token and authenticate internally.
153+
2. The JDBC driver will take the token obtained from step 1 as the password ( `token as password`) to connect with the PostgreSQL server.
154+
3. The PostgreSQL server will check the access token and authenticate internally.
155155

156156
### Token as password
157157

sdk/identity/azure-identity-extensions/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
- [Getting started](#getting-started)
33
- [Prerequisites](#prerequisites)
44
- [Key concepts](#key-concepts)
5+
- [Architecture](#architecture)
6+
- [Authenticating with JDBC](#authenticating-with-jdbc)
57
- [Examples](#examples)
68
- [Troubleshooting](#troubleshooting)
79
- [Next steps](#next-steps)
@@ -25,6 +27,13 @@ Azure Identity Extensions contains a common template framework for users to get
2527
use the token as a password. For example, to connect Azure hosted MySQL, get a token from Azure AD and use the
2628
token as a password to connect with MySQL.
2729

30+
## Architecture
31+
32+
### Authenticating with JDBC
33+
34+
This picture shows how the JDBC authentication plugins provided by Azure Identity Extensions authenticate with managed identity.
35+
![Architecture](img/passwordless-connections-from-java-apps-to-data-services.jpg)
36+
2837
## Examples
2938
For documentation on how to use this package, please refer to [Quickstart:Use Java and JDBC with Azure Database for MySQL](https://aka.ms/passwordless/quickstart/mysql) and [Quickstart:Use Java and JDBC with Azure Database for PostgreSQL](https://aka.ms/passwordless/quickstart/postgresql).
3039

2.63 MB
Loading

0 commit comments

Comments
 (0)