Skip to content

Commit 5704641

Browse files
authored
Update develop-storage-files-storage-access-control.md
-Update a few occurrences of user_name to sql_login_name or sql_user_name to avoid mis-understanding. -Add suffix 'in the master database' and 'in the user database' accordingly to avoid confusion.
1 parent 1fb1902 commit 5704641

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/synapse-analytics/sql/develop-storage-files-storage-access-control.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -275,32 +275,32 @@ To query a file located in Azure Storage, your serverless SQL pool endpoint need
275275
276276
To grant the ability manage credentials:
277277
278-
- To allow a user to create or drop a server-level credential, an administrator must grant the `ALTER ANY CREDENTIAL` permission to the user. For example:
278+
- To allow a user to create or drop a server-level credential, an administrator must grant the `ALTER ANY CREDENTIAL` permission to the SQL login in the master database. For example:
279279
280280
```sql
281-
GRANT ALTER ANY CREDENTIAL TO [user_name];
281+
GRANT ALTER ANY CREDENTIAL TO [sql_login_name];
282282
```
283283
284-
- To allow a user to create or drop a database scoped credential, an administrator must grant the `CONTROL` permission on the database to the user. For example:
284+
- To allow a user to create or drop a database scoped credential, an administrator must grant the `CONTROL` permission on the database to the database user in the user database. For example:
285285
286286
```sql
287-
GRANT CONTROL ON DATABASE::[database_name] TO [user_name];
287+
GRANT CONTROL ON DATABASE::[database_name] TO [sql_user_name];
288288
```
289289
290290
### Grant permissions to use credential
291291
292292
Database users who access external storage must have permission to use credentials. To use the credential, a user must have the `REFERENCES` permission on a specific credential.
293293
294-
To grant the `REFERENCES` permission on a server-level credential for a user, use the following T-SQL query:
294+
To grant the `REFERENCES` permission on a server-level credential for a SQL login, use the following T-SQL query in the master database:
295295
296296
```sql
297-
GRANT REFERENCES ON CREDENTIAL::[server-level_credential] TO [user];
297+
GRANT REFERENCES ON CREDENTIAL::[server-level_credential] TO [sql_login_name];
298298
```
299299

300-
To grant a `REFERENCES` permission on a database-scoped credential for a user, use the following T-SQL query:
300+
To grant a `REFERENCES` permission on a database-scoped credential for a database user, use the following T-SQL query in the user database:
301301

302302
```sql
303-
GRANT REFERENCES ON DATABASE SCOPED CREDENTIAL::[database-scoped_credential] TO [user];
303+
GRANT REFERENCES ON DATABASE SCOPED CREDENTIAL::[database-scoped_credential] TO [sql_user_name];
304304
```
305305

306306
## Server-level credential
@@ -554,4 +554,4 @@ These articles help you learn how query different folder types, file types, and
554554
- [Query Parquet files](query-parquet-files.md)
555555
- [Create and use views](create-use-views.md)
556556
- [Query JSON files](query-json-files.md)
557-
- [Query Parquet nested types](query-parquet-nested-types.md)
557+
- [Query Parquet nested types](query-parquet-nested-types.md)

0 commit comments

Comments
 (0)