You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/synapse-analytics/sql/develop-openrowset.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,8 +52,8 @@ The storage administrator must also enable a user to access the files by providi
52
52
`OPENROWSET` use the following rules to determine how to authenticate to storage:
53
53
-In`OPENROWSET` without `DATA_SOURCE` authentication mechanism depends on caller type.
54
54
- AAD logins can access files only using their own [Azure AD identity](develop-storage-files-storage-access-control.md?tabs=user-identity#supported-storage-authorization-types) if Azure storage allows the Azure AD user to access underlying files (for example, if the caller has Storage Reader permission on storage) and if you [enable Azure AD passthrough authentication](develop-storage-files-storage-access-control.md#force-azure-ad-pass-through) on Synapse SQL service.
55
-
- SQL logins can also use `OPENROWSET` without `DATA_SOURCE` to access publicly available files, files protected using SAS token or Managed Identity of Synapse workspace. You would need to [create server-scoped credential](develop-storage-files-storage-access-control.md#examples) to allow access to storage files.
56
-
-In`OPENROWSET` with `DATA_SOURCE` authentication mechanism is defined in database scoped credential assigned to the referenced data source. This option enables you to access publicly available storage, or access storage using SAS token, Managed Identity of workspace, or [Azure AD identity of caller](develop-storage-files-storage-access-control.md?tabs=user-identity#supported-storage-authorization-types) (if caller is Azure AD principal). If `DATA_SOURCE` references Azure storage that is not public, you would need to [create database-scoped credential](develop-storage-files-storage-access-control.md#examples) and reference it in `DATA SOURCE` to allow access to storage files.
55
+
- SQL logins can also use `OPENROWSET` without `DATA_SOURCE` to access publicly available files, files protected using SAS token,or Managed Identity of Synapse workspace. You would need to [create server-scoped credential](develop-storage-files-storage-access-control.md#examples) to allow access to storage files.
56
+
-In`OPENROWSET` with `DATA_SOURCE` authentication mechanism is defined in database scoped credential assigned to the referenced data source. This option enables you to access publicly available storage, or access storage using SAS token, Managed Identity of workspace, or [Azure AD identity of caller](develop-storage-files-storage-access-control.md?tabs=user-identity#supported-storage-authorization-types) (if caller is Azure AD principal). If `DATA_SOURCE` references Azure storage that isn't public, you would need to [create database-scoped credential](develop-storage-files-storage-access-control.md#examples) and reference it in `DATA SOURCE` to allow access to storage files.
57
57
58
58
Caller must have `REFERENCES` permission on credential to use it to authenticate to storage.
59
59
@@ -162,7 +162,7 @@ Specifies the field terminator to be used. The default field terminator is a com
162
162
163
163
ROWTERMINATOR ='row_terminator'`
164
164
165
-
Specifies the row terminator to be used. If row terminator is not specified one of default terminators will be used. Default terminators for PARSER_VERSION = '1.0' are \r\n, \n and \r. Default terminators for PARSER_VERSION = '2.0' are \r\n and \n.
165
+
Specifies the row terminator to be used. If row terminator is not specified, one of default terminators will be used. Default terminators for PARSER_VERSION = '1.0' are \r\n, \n and \r. Default terminators for PARSER_VERSION = '2.0' are \r\n and \n.
166
166
167
167
ESCAPE_CHAR = 'char'
168
168
@@ -186,18 +186,18 @@ Specifies compression method. Following compression method is supported:
186
186
187
187
PARSER_VERSION = 'parser_version'
188
188
189
-
Specifies parser version to be used when reading files. Currently supported CSV parser versions are 1.0 and 2.0
189
+
Specifies parser version to be used when reading files. Currently supported CSV parser versions are 1.0 and 2.0:
190
190
191
191
- PARSER_VERSION = '1.0'
192
192
- PARSER_VERSION = '2.0'
193
193
194
-
CSV parser version 1.0 is default and feature-rich, while 2.0 is built for performance and does not support all options and encodings.
194
+
CSV parser version 1.0 is default and featurerich, while 2.0 is built for performance and does not support all options and encodings.
195
195
196
196
CSV parser version 2.0 specifics:
197
197
198
198
- Not all data types are supported.
199
-
- Maximum row size limit is 8MB.
200
-
- Following options are not supported: DATA_COMPRESSION.
199
+
- Maximum row size limit is 8 MB.
200
+
- Following options aren't supported: DATA_COMPRESSION.
201
201
- Quoted empty string ("") is interpreted as empty string.
202
202
203
203
## Examples
@@ -229,9 +229,9 @@ FROM
229
229
) AS [r]
230
230
```
231
231
232
-
If you are getting an error saying that the files cannot be listed, you need to enable access to public storage in Synapse SQL on-demand:
233
-
- If you are using a SQL login you need to [create server-scoped credential that allows access to public storage](develop-storage-files-storage-access-control.md#examples).
234
-
- If you are using an Azure AD principal to access public storage, you would need to [create server-scoped credential that allows access to public storage](develop-storage-files-storage-access-control.md#examples) and disable [Azure AD passthrough authentication](develop-storage-files-storage-access-control.md#disable-forcing-azure-ad-pass-through).
232
+
If you're getting an error saying that the files cannot be listed, you need to enable access to public storage in Synapse SQL on-demand:
233
+
- If you're using a SQL login, you need to [create server-scoped credential that allows access to public storage](develop-storage-files-storage-access-control.md#examples).
234
+
- If you're using an Azure AD principal to access public storage, you would need to [create server-scoped credential that allows access to public storage](develop-storage-files-storage-access-control.md#examples) and disable [Azure AD passthrough authentication](develop-storage-files-storage-access-control.md#disable-forcing-azure-ad-pass-through).
0 commit comments