Set TLS to 1.2 in Powershell and try again
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Set TLS to 1.2 in Powershell and try again
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
$PWD.Path

Ping -t 8.8.8.8 | ForEach {"{0} - {1}" -f (Get-Date),$_}

$Clustername = "The_Cluster"
Set-Alias Start-PowerShell64 "$env:windir\sysnative\WindowsPowerShell\v1.0\powershell.exe"
# Create run string, to be able to parse argument
$runThis = "Start-PowerShell64 {Get-ClusterNode -Cluster " + $Clustername + "}"
$Outdata = Invoke-Expression $runThis
if($teststring -match "^\d+$")
{
Write-host "It's a number"
}
$allDCs = (Get-ADForest).Domains | %{ Get-ADDomainController -Filter * -Server $_ }
Add-WindowsFeature -Name "RSAT-AD-PowerShell" –IncludeAllSubFeature
sudo netstat -tulpn | grep LISTEN


First of all, you need to add an Azure Active Administrator to the SQL

In SQL studio to add user/groups:
CREATE USER [Team_xyz] FROM EXTERNAL PROVIDER; EXEC sp_addrolemember db_owner, [Team_xyz];