You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/business-process-tracking/set-up-continuous-integration-deployment.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -314,19 +314,19 @@ After you finish these steps, your business process pipelines now appear in the
314
314
315
315
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables.
316
316
317
-
1. On your Data Explorer cluster, check whether your service connection has contributor access. If not, assign your service connection the appropriate role on your cluster.
317
+
1. On the cluster, check whether your service connection has the **Contributor** role or access. If not, assign your service connection the appropriate role on your cluster.
318
318
319
319
For more information, see the following documentation:
320
320
321
-
-[Manage Azure Data Explorer cluster permissions](/azure/data-explorer/manage-cluster-permissions)
-[Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
322
+
-[Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
323
323
324
324
1. On the cluster database where your service connection needs to create a table, make sure that your service connection has administrator privileges.
325
325
326
326
For more information, see the following documentation:
-[Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
329
+
-[Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
330
330
331
331
## Create infrastructure pipeline for your business process
0 commit comments