Hi @sandra1 ,
We got around this issue two ways:
First way - Create a security group in the tenant - assign the required sql administrators - assign the group to the azure ad admin portion of SQL
Second way -
USE management;
GO
CREATE ROLE [standardUser];
GO
ALTER ROLE [db_datareader] ADD MEMBER [standardUser];
ALTER ROLE [db_datawriter] ADD MEMBER [standardUser];
GO
CREATE USER [ben@nextstepcreations.com.au] FROM EXTERNAL PROVIDER;
GO
ALTER ROLE [standardUser] ADD MEMBER [ben@nextstepcreations.com.au];
GO
The Above SQL Query Creates the defined role with read and write permissions to the database 'management' it then assigns azure ad user ben@nextstepcreations.com.au <-- me to the above created role.
If the connector is the issue. Create the SQL Server connection in the PowerPlatform as the administrator and see how you go.
Hope this helps!
Regards,
Benjamin Western | Automation Specialist
NextStep Creations
Taking your PowerApps Skill the NextStep
User | Count |
---|---|
183 | |
106 | |
89 | |
44 | |
43 |
User | Count |
---|---|
226 | |
108 | |
106 | |
68 | |
68 |