Skip to content

Commit 3bba2e3

Browse files
Clare Zheng (Shanghai Wicresoft Co Ltd)Clare Zheng (Shanghai Wicresoft Co Ltd)
authored andcommitted
Update property and JSON
1 parent 1432de1 commit 3bba2e3

File tree

1 file changed

+9
-12
lines changed

1 file changed

+9
-12
lines changed

articles/data-factory/connector-rest.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -141,12 +141,11 @@ Set the **authenticationType** property to **AadServicePrincipal**. In addition
141141
|:--- |:--- |:--- |
142142
| servicePrincipalId | Specify the Microsoft Entra application's client ID. | Yes |
143143
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalKey` and `ServicePrincipalCert`. | No |
144-
| servicePrincipalCredential | When you use **ServicePrincipalKey** as the credential type, specify the application's key. Mark this field as **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). <br> When you use **ServicePrincipalCert** as the credential type, store embeddedCert and embeddedCertPassword in object. For more information, see the property description and JSON example below. | No |
145144
| ***For ServicePrincipalKey*** | | |
146145
| servicePrincipalKey | When you use **ServicePrincipalKey** as the credential type, specify the application's key. Mark this field as **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
147146
| ***For ServicePrincipalCert*** | | |
148-
| embeddedCert | When you use **ServicePrincipalCert** as the credential type, specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). You also need to go to this [section](#save-the-service-principal-certificate-in-azure-key-vault) to learn how to save the certificate in Azure Key Vault. | No |
149-
| embeddedCertPassword | When you use **ServicePrincipalCert** as the credential type, specify the password of your certificate if your certificate is secured with a password. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
147+
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Go to this [section](#save-the-service-principal-certificate-in-azure-key-vault) to learn how to save the certificate in Azure Key Vault. | No |
148+
| servicePrincipalEmbeddedCertPassword | Specify the password of your certificate if your certificate is secured with a password. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
150149
| | | |
151150
| tenant | Specify the tenant information (domain name or tenant ID) under which your application resides. Retrieve it by hovering the mouse in the top-right corner of the Azure portal. | Yes |
152151
| aadResourceId | Specify the Microsoft Entra resource you are requesting for authorization, for example, `https://management.core.windows.net`.| Yes |
@@ -191,15 +190,13 @@ Set the **authenticationType** property to **AadServicePrincipal**. In addition
191190
"authenticationType": "AadServicePrincipal",
192191
"servicePrincipalId": "<service principal id>",
193192
"servicePrincipalCredentialType": "ServicePrincipalCert",
194-
"servicePrincipalCredential": {
195-
"embeddedCert": {
196-
"type": "SecureString",
197-
"value": "<the base64 encoded certificate of your application registered in Microsoft Entra ID>"
198-
},
199-
"embeddedCertPassword": {
200-
"type": "SecureString",
201-
"value": "<password of your certificate>"
202-
}
193+
"servicePrincipalEmbeddedCert": {
194+
"type": "SecureString",
195+
"value": "<the base64 encoded certificate of your application registered in Microsoft Entra ID>"
196+
},
197+
"servicePrincipalEmbeddedCertPassword": {
198+
"type": "SecureString",
199+
"value": "<password of your certificate>"
203200
},
204201
"tenant": "<tenant info, e.g. microsoft.onmicrosoft.com>",
205202
"aadResourceId": "<Azure AD resource URL e.g. https://management.core.windows.net>"

0 commit comments

Comments
 (0)