Skip to content

Commit 5f9de09

Browse files
authored
Pencil edit: correct list indentation
1 parent 77c84f7 commit 5f9de09

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/purview/register-scan-hdfs.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To create and run a new scan, follow these steps:
9696
* Provide the user name in the format of `<username>@<domain>.com` in the User name input field. Learn more from [Use Kerberos authentication for the HDFS connector](#use-kerberos-authentication-for-the-hdfs-connector).
9797
* Store the user password used to connect to HDFS in the secret key.
9898

99-
:::image type="content" source="media/register-scan-hdfs/scan.png" alt-text="Screenshot of HDFS scan configurations in Purview." border="true":::
99+
:::image type="content" source="media/register-scan-hdfs/scan.png" alt-text="Screenshot of HDFS scan configurations in Purview." border="true":::
100100

101101
1. Select **Test connection**.
102102

@@ -276,13 +276,13 @@ Kadmin> addprinc <username>@<REALM.COM>
276276

277277
1. Select the encryption algorithm you want to use when you connect to the KDC server. You can select all the options.
278278

279-
:::image type="content" source="media/register-scan-hdfs/config-encryption-types-for-kerberos.png" alt-text="Screenshot of the Network security: Configure encryption types allowed for Kerberos pane.":::
279+
:::image type="content" source="media/register-scan-hdfs/config-encryption-types-for-kerberos.png" alt-text="Screenshot of the Network security: Configure encryption types allowed for Kerberos pane.":::
280280

281281
1. Use the `Ksetup` command to specify the encryption algorithm to be used on the specified realm.
282282

283-
```cmd
284-
C:> ksetup /SetEncTypeAttr REALM.COM DES-CBC-CRC DES-CBC-MD5 RC4-HMAC-MD5 AES128-CTS-HMAC-SHA1-96 AES256-CTS-HMAC-SHA1-96
285-
```
283+
```cmd
284+
C:> ksetup /SetEncTypeAttr REALM.COM DES-CBC-CRC DES-CBC-MD5 RC4-HMAC-MD5 AES128-CTS-HMAC-SHA1-96 AES256-CTS-HMAC-SHA1-96
285+
```
286286

287287
4. Create the mapping between the domain account and the Kerberos principal, so that you can use the Kerberos principal in the Windows domain.
288288

0 commit comments

Comments
 (0)