You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/synapse-analytics/sql/develop-storage-files-storage-access-control.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ You can get an SAS token by navigating to the **Azure portal -> Storage Account
42
42
>
43
43
> SAS token: ?sv=2018-03-28&ss=bfqt&srt=sco&sp=rwdlacup&se=2019-04-18T20:42:12Z&st=2019-04-18T12:42:12Z&spr=https&sig=lQHczNvrk1KoYLCpFdSsMANd0ef9BrIPBNJ3VYEIq78%3D
44
44
45
-
You need to create database-scoped or server-scoped crednential to enable access using SAS token.
45
+
You need to create database-scoped or server-scoped credential to enable access using SAS token.
46
46
47
47
### [User Identity](#tab/user-identity)
48
48
@@ -132,7 +132,7 @@ To allow a user to create or drop a credential, admin can GRANT/DENY ALTER ANY C
132
132
GRANT ALTER ANY CREDENTIAL TO [user_name];
133
133
```
134
134
135
-
Database users who access external storage must have permission to use crednetials.
135
+
Database users who access external storage must have permission to use credentials.
136
136
137
137
### Grant permissions to use credential
138
138
@@ -166,7 +166,7 @@ Server-level CREDENTIAL name must match the full path to the storage account (an
166
166
> [!NOTE]
167
167
> There is special server-level CREDENTIAL `UserIdentity` that [forces Azure AD pass-through](?tabs=user-identity#force-azure-ad-pass-through).
168
168
169
-
Server-scoped credentials enable access to Azure storage using the following authenticaiton types:
169
+
Server-scoped credentials enable access to Azure storage using the following authentication types:
The following script creates a server-level credential that enables user to impersonate using his Azure AD identity.
187
+
The following script creates a server-level credential that enables user to impersonate using Azure AD identity.
188
188
189
189
```sql
190
190
CREATE CREDENTIAL [UserIdentity]
@@ -218,7 +218,7 @@ GO
218
218
219
219
Database-scoped credentials are used when any principal calls `OPENROWSET` function with `DATA_SOURCE` or selects data from [external table](develop-tables-external-tables.md) that don't access public files. The database scoped credential doesn't need to match the name of storage account because it will be explicitly used in DATA SOURCE that defines the location of storage.
220
220
221
-
Database-scoped credentials enable access to Azure storage using the following authenticaiton types:
221
+
Database-scoped credentials enable access to Azure storage using the following authentication types:
Database user can the content of the files from the data source using external table or OEPNROWSET function that references the data source:
287
+
Database user can read the content of the files from the data source using external table or [OPENROWSET](develop-openrowset.md) function that references the data source:
Database user can the content of the files from the data source using external table or OEPNROWSET function that references the data source:
331
+
Database user can read the content of the files from the data source using [external table](develop-tables-external-tables.md) or [OPENROWSET](develop-openrowset.md) function that references the data source:
0 commit comments