Skip to content

Commit a5fb6cf

Browse files
authored
Merge pull request #113475 from julieMSFT/20200430_issue35212
20200430 issue35212
2 parents 2c88922 + eb4fd1a commit a5fb6cf

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sql-database/sql-database-vnet-service-endpoint-rule-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,10 +130,10 @@ PolyBase is commonly used to load data into Azure Synapse Analytics from Azure S
130130
> - If you have a general-purpose v1 or blob storage account, you must **first upgrade to v2** using this [guide](https://docs.microsoft.com/azure/storage/common/storage-account-upgrade).
131131
> - For known issues with Azure Data Lake Storage Gen2, please refer to this [guide](https://docs.microsoft.com/azure/storage/data-lake-storage/known-issues).
132132
133-
1. Under your storage account, navigate to **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server (logical server of your Azure Synapse Analytics data warehouse) which you've registered with Azure Active Directory (AAD) as in step#1.
133+
1. Under your storage account, navigate to **Access Control (IAM)**, and select **Add role assignment**. Select the **Storage Blob Data Contributor** RBAC role from the drop down. For **Assign access to** select **Azure AD user, group, or service principal**. For **Select**, type the server name of your Azure SQL Server (logical server of your Azure Synapse Analytics data warehouse) which you've registered with Azure Active Directory (AAD) as in step 1. Use only the server name not the fully qualified DNS name (**servername** without .database.windows.net)
134134

135135
> [!NOTE]
136-
> Only members with Owner privilege can perform this step. For various built-in roles for Azure resources, refer to this [guide](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles).
136+
> Only members with Owner privilege on the storage account can perform this step. For various built-in roles for Azure resources, refer to this [guide](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles).
137137
138138
1. **Polybase connectivity to the Azure Storage account:**
139139

0 commit comments

Comments
 (0)