Skip to content

Commit a57479f

Browse files
committed
Fix typo
Oauth -> OAuth
1 parent cbe6d55 commit a57479f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/synapse-analytics/sql/develop-storage-files-storage-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -345,7 +345,7 @@ Optionally, you can use just the base URL of the storage account, without contai
345345

346346
### [Service principal](#tab/service-principal)
347347

348-
The following script creates a server-level credential that can be used to access files in a storage using Service principal for authentication and authorization. **AppID** can be found by visiting App registrations in Azure portal and selecting the App requesting storage access. **Secret** is obtained during the App registration. **AuthorityUrl** is URL of Microsoft Entra ID Oauth2.0 authority.
348+
The following script creates a server-level credential that can be used to access files in a storage using Service principal for authentication and authorization. **AppID** can be found by visiting App registrations in Azure portal and selecting the App requesting storage access. **Secret** is obtained during the App registration. **AuthorityUrl** is URL of Microsoft Entra ID OAuth2.0 authority.
349349

350350
```sql
351351
CREATE CREDENTIAL [https://<storage_account>.dfs.core.windows.net/<container>]
@@ -410,7 +410,7 @@ WITH ( LOCATION = 'https://<storage_account>.dfs.core.windows.net/<containe
410410
```
411411

412412
### [Service principal](#tab/service-principal)
413-
The following script creates a database-scoped credential that can be used to access files in a storage using service principal for authentication and authorization. **AppID** can be found by visiting App registrations in Azure portal and selecting the App requesting storage access. **Secret** is obtained during the App registration. **AuthorityUrl** is URL of Microsoft Entra ID Oauth2.0 authority.
413+
The following script creates a database-scoped credential that can be used to access files in a storage using service principal for authentication and authorization. **AppID** can be found by visiting App registrations in Azure portal and selecting the App requesting storage access. **Secret** is obtained during the App registration. **AuthorityUrl** is URL of Microsoft Entra ID OAuth2.0 authority.
414414

415415
```sql
416416
-- Optional: Create MASTER KEY if not exists in database:

0 commit comments

Comments
 (0)