Skip to content

Commit 219e542

Browse files
committed
Formatting
1 parent ddc34ec commit 219e542

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

articles/purview/register-scan-adls-gen2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,8 @@ Your Azure network may allow for communications between your Azure resources, bu
9292

9393
#### Using a system or user assigned managed identity for scanning
9494

95+
There are two types of managed identity you can use:
96+
9597
* **System-assigned managed identity (Recommended)** - As soon as the Microsoft Purview Account is created, a system-assigned managed identity (SAMI) is created automatically in Azure AD tenant. Depending on the type of resource, specific RBAC role assignments are required for the Microsoft Purview system-assigned managed identity (SAMI) to perform the scans.
9698

9799
* **User-assigned managed identity** (preview) - Similar to a system managed identity, a user-assigned managed identity (UAMI) is a credential resource that can be used to allow Microsoft Purview to authenticate against Azure Active Directory. For more information, you can see our [User-assigned managed identity guide](manage-credentials.md#create-a-user-assigned-managed-identity).
@@ -139,8 +141,6 @@ It's important to give your Microsoft Purview account or user-assigned managed i
139141
> [!Note]
140142
> If you use this option, you need to deploy an _Azure key vault_ resource in your subscription and [assign _Microsoft Purview account’s_ System Assigned Managed Identity (SAMI) required access permission to secrets inside _Azure key vault_.](manage-credentials.md#microsoft-purview-permissions-on-the-azure-key-vault)
141143
142-
* **Account Key** - Secrets can be created inside an Azure Key Vault to store credentials in order to enable access for Microsoft Purview to scan data sources securely using the secrets. A secret can be a storage account key, SQL login password, or a password.
143-
144144
When authentication method selected is **Account Key**, you need to get your access key and store in the key vault:
145145

146146
1. Navigate to your ADLS Gen2 storage account

articles/purview/register-scan-azure-blob-storage-source.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ Your Azure network may allow for communications between your Azure resources, bu
9797

9898
#### Using a system or user assigned managed identity for scanning
9999

100+
There are two types of managed identity you can use:
101+
100102
* **System-assigned managed identity (Recommended)** - As soon as the Microsoft Purview Account is created, a system-assigned managed identity (SAMI) is created automatically in Azure AD tenant. Depending on the type of resource, specific RBAC role assignments are required for the Microsoft Purview system-assigned managed identity (SAMI) to perform the scans.
101103

102104
* **User-assigned managed identity** (preview) - Similar to a system managed identity, a user-assigned managed identity (UAMI) is a credential resource that can be used to allow Microsoft Purview to authenticate against Azure Active Directory. For more information, you can see our [User-assigned managed identity guide](manage-credentials.md#create-a-user-assigned-managed-identity).

0 commit comments

Comments
 (0)