Skip to content

Commit b648cb2

Browse files
committed
acrolinx and fix links
1 parent a639dbd commit b648cb2

File tree

2 files changed

+6
-7
lines changed

2 files changed

+6
-7
lines changed

articles/data-explorer/provision-aad-app.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ A service principal is automatically created when the application registration i
6262
6363
![Copy client secret key value](media/provision-aad-app/create-app-reg-copy-client-secret.png)
6464

65-
Your application is created. If you only need access to an authorized Azure Data Explorer resource, such as in the programmatic example below, skip the next section. If you need support for delegated permissions, see [configure delegated permissions for the application registration](#configure-delegated-permissions-for-the-application-registration).
65+
Your application is created. If you only need access to an authorized Azure Data Explorer resource, such as in the programmatic example below, skip the next section. For delegated permissions support, see [configure delegated permissions for the application registration](#configure-delegated-permissions-for-the-application-registration).
6666

6767
## Configure delegated permissions for the application registration
6868

@@ -71,7 +71,7 @@ If your application needs to access Azure Data Explorer using the credentials of
7171
1. In the **API permissions** blade, select **Add a permission**.
7272
1. Select **APIs my organization uses**. Search for and select **Azure Data Explorer**.
7373

74-
![Add Azure Data Explorer API permission](media/provision-aad-app/configure-delegated-add-api-permissions.png)
74+
![Add Azure Data Explorer API permission](media/provision-aad-app/configure-delegated-add-api-permission.png)
7575

7676
1. In **Delegated permissions**, select the **user_impersonation** box and **Add permissions**
7777

@@ -98,13 +98,13 @@ Now that your service principal application registration is created, you need to
9898
The last parameter is a string that shows up as notes when you query the roles associated with a database.
9999
100100
> [!NOTE]
101-
> After creating the application registration, there may be a several minute delay until Azure Data Explorer can reference it. If you receive an error, that the application is not found, when executing this command, wait and try again.
101+
> After creating the application registration, there may be a several minute delay until Azure Data Explorer can reference it. If, when executing the command, you receive an error that the application is not found, wait and try again.
102102
103-
For additional information, see [security roles management](/azure/kusto/management/security-roles) and [ingestion permissions](azure/kusto/api/netfx/kusto-ingest-client-permissions.md).
103+
For more information, see [security roles management](/azure/kusto/management/security-roles) and [ingestion permissions](/azure/kusto/api/netfx/kusto-ingest-client-permissions.md).
104104
105105
## Using application credentials to access a database
106106
107-
Use the application credentials to programmatically access your database by using the [Azure Data Explorer client library](azure/kusto/api/netfx/about-kusto-data.md).
107+
Use the application credentials to programmatically access your database by using the [Azure Data Explorer client library](/azure/kusto/api/netfx/about-kusto-data.md).
108108
109109
```C#
110110
. . .
@@ -129,8 +129,7 @@ var queryResult = client.ExecuteQuery($"{query}");
129129

130130
### Invalid resource error
131131

132-
If your application is used to authenticate users or applications for Azure Data Explorer access, you must set up delegated permissions for Azure Data Explorer service application. You must declare your application can authenticate users or applications for Azure Data Explorer access.
133-
Not doing so will result in an error similar to the following, when an authentication attempt is made:
132+
If your application is used to authenticate users or applications for Azure Data Explorer access, you must set up delegated permissions for Azure Data Explorer service application. Declare your application can authenticate users or applications for Azure Data Explorer access. Not doing so will result in an error similar to the following, when an authentication attempt is made:
134133

135134
`AADSTS650057: Invalid resource. The client has requested access to a resource which is not listed in the requested permissions in the client's application registration...`
136135

0 commit comments

Comments
 (0)