Skip to content

Commit a52f30c

Browse files
Update develop-storage-files-storage-access-control.md
1 parent 3611c80 commit a52f30c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/synapse-analytics/sql/develop-storage-files-storage-access-control.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You can get an SAS token by navigating to the **Azure portal -> Storage Account
4242
>
4343
> SAS token: ?sv=2018-03-28&ss=bfqt&srt=sco&sp=rwdlacup&se=2019-04-18T20:42:12Z&st=2019-04-18T12:42:12Z&spr=https&sig=lQHczNvrk1KoYLCpFdSsMANd0ef9BrIPBNJ3VYEIq78%3D
4444
45-
You need to create database-scoped or server-scoped crednential to enable access using SAS token.
45+
You need to create database-scoped or server-scoped credential to enable access using SAS token.
4646

4747
### [User Identity](#tab/user-identity)
4848

@@ -132,7 +132,7 @@ To allow a user to create or drop a credential, admin can GRANT/DENY ALTER ANY C
132132
GRANT ALTER ANY CREDENTIAL TO [user_name];
133133
```
134134

135-
Database users who access external storage must have permission to use crednetials.
135+
Database users who access external storage must have permission to use credentials.
136136

137137
### Grant permissions to use credential
138138

@@ -166,7 +166,7 @@ Server-level CREDENTIAL name must match the full path to the storage account (an
166166
> [!NOTE]
167167
> There is special server-level CREDENTIAL `UserIdentity` that [forces Azure AD pass-through](?tabs=user-identity#force-azure-ad-pass-through).
168168
169-
Server-scoped credentials enable access to Azure storage using the following authenticaiton types:
169+
Server-scoped credentials enable access to Azure storage using the following authentication types:
170170

171171
### [Shared access signature](#tab/shared-access-signature)
172172

@@ -184,7 +184,7 @@ GO
184184

185185
### [User Identity](#tab/user-identity)
186186

187-
The following script creates a server-level credential that enables user to impersonate using his Azure AD identity.
187+
The following script creates a server-level credential that enables user to impersonate using Azure AD identity.
188188

189189
```sql
190190
CREATE CREDENTIAL [UserIdentity]
@@ -218,7 +218,7 @@ GO
218218

219219
Database-scoped credentials are used when any principal calls `OPENROWSET` function with `DATA_SOURCE` or selects data from [external table](develop-tables-external-tables.md) that don't access public files. The database scoped credential doesn't need to match the name of storage account because it will be explicitly used in DATA SOURCE that defines the location of storage.
220220

221-
Database-scoped credentials enable access to Azure storage using the following authenticaiton types:
221+
Database-scoped credentials enable access to Azure storage using the following authentication types:
222222

223223
### [Shared access signature](#tab/shared-access-signature)
224224

@@ -284,7 +284,7 @@ CREATE EXTERNAL TABLE dbo.userPublicData ( [id] int, [first_name] varchar(8000),
284284
WITH ( LOCATION = 'parquet/user-data/*.parquet', DATA_SOURCE = [publicData], FILE_FORMAT = [SynapseParquetFormat] )
285285
```
286286

287-
Database user can the content of the files from the data source using external table or OEPNROWSET function that references the data source:
287+
Database user can read the content of the files from the data source using external table or [OPENROWSET](develop-openrowset.md) function that references the data source:
288288

289289
```sql
290290
SELECT TOP 10 * FROM dbo.userPublicData;
@@ -328,7 +328,7 @@ WITH ( LOCATION = 'parquet/user-data/*.parquet', DATA_SOURCE = [mysample], FILE_
328328

329329
```
330330

331-
Database user can the content of the files from the data source using external table or OEPNROWSET function that references the data source:
331+
Database user can read the content of the files from the data source using [external table](develop-tables-external-tables.md) or [OPENROWSET](develop-openrowset.md) function that references the data source:
332332

333333
```sql
334334
SELECT TOP 10 * FROM dbo.userdata;

0 commit comments

Comments
 (0)