Skip to content

Commit 34731fe

Browse files
author
ecfan
committed
Clarity edits
1 parent a9f3a6b commit 34731fe

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/business-process-tracking/set-up-continuous-integration-deployment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -314,19 +314,19 @@ After you finish these steps, your business process pipelines now appear in the
314314

315315
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables.
316316

317-
1. On your Data Explorer cluster, check whether your service connection has contributor access. If not, assign your service connection the appropriate role on your cluster.
317+
1. On the cluster, check whether your service connection has the **Contributor** role or access. If not, assign your service connection the appropriate role on your cluster.
318318

319319
For more information, see the following documentation:
320320

321-
- [Manage Azure Data Explorer cluster permissions](/azure/data-explorer/manage-cluster-permissions)
322-
- [Security roles overview](/kusto/management/security-roles?view=azure-data-explorer&preserve-view=true)
321+
- [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
322+
- [Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
323323

324324
1. On the cluster database where your service connection needs to create a table, make sure that your service connection has administrator privileges.
325325

326326
For more information, see the following documentation:
327327

328-
- [Manage database security roles](/kusto/management/manage-database-security-roles?view=azure-data-explorer&preserve-view=true)
329-
- [Security roles overview](/kusto/management/security-roles?view=azure-data-explorer&preserve-view=true)
328+
- [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
329+
- [Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
330330

331331
## Create infrastructure pipeline for your business process
332332

0 commit comments

Comments
 (0)