To connect to an Azure database with the Microsoft Entra MFA authentication, you should register dbForge Data Generator for SQL Server as a Microsoft Entra application and set permissions. During the registration, an application ID will be generated automatically.
1. Sign in to the Azure portal.
2. In Azure services, click Microsoft Entra ID. Then, select Add > App registration.
3. On the Register an application page, enter dbForge Data Generator in the Name field and click Register.
Note
After dbForge Data Generator has been registered as an application, the application ID is generated automatically. It is a unique and unchangeable identifier for dbForge Data Generator for SQL Server. You need to copy and save it to connect dbForge Data Generator for SQL Server to the Azure database.
4. On the page that opens, click Add a Redirect URI.
5. On the dbForge Data Generator > Authentication page, click Add a platform and then click Mobile and desktop applications.
6. In the Configure Desktop + Devices window, select https://login.microsoftonline.com/common/oauth2/nativeclient as a redirect URI and click Configure.
7. On the Authentication page, switch to the Advanced settings section, turn the toggle switch next to Allow public client flows to Yes, and then click Save.
8. In the Azure portal, click API permissions and then click Add a permission.
9. In the Request API permissions window that opens, switch to the APIs my organization uses tab and start typing Azure SQL Database in the Search field.
10. From the list, select Azure SQL Database.
11. Click Delegated permissions, select the user_impersonation checkbox, and then click Add permissions.