Skip to content

Commit ddc34ec

Browse files
committed
Acrolinx
1 parent 96c3ffb commit ddc34ec

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/purview/register-scan-azure-blob-storage-source.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,23 +25,23 @@ For file types such as csv, tsv, psv, ssv, the schema is extracted when the foll
2525

2626
* First row values are non-empty
2727
* First row values are unique
28-
* First row values are not a date or a number
28+
* First row values aren't a date or a number
2929

3030
## Prerequisites
3131

3232
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3333

3434
* An active [Microsoft Purview account](create-catalog-portal.md).
3535

36-
* You will need to be a Data Source Administrator and Data Reader to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
36+
* You'll need to be a Data Source Administrator and Data Reader to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
3737

3838
\** Lineage is supported if dataset is used as a source/sink in [Data Factory Copy activity](how-to-link-azure-data-factory.md)
3939

4040
## Register
4141
This section will enable you to register the Azure Blob storage account for scan and data share in Purview.
4242

4343
### Prerequisites for register
44-
* You will need to be a Data Source Admin and one of the other Purview roles (e.g. Data Reader or Data Share Contributor) to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
44+
* You'll need to be a Data Source Admin and one of the other Purview roles (for example, Data Reader or Data Share Contributor) to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
4545

4646
### Steps to register
4747

@@ -81,7 +81,7 @@ For file types such as csv, tsv, psv, ssv, the schema is extracted when the foll
8181

8282
* First row values are non-empty
8383
* First row values are unique
84-
* First row values are neither a date nor a number
84+
* First row values are not a date or a number
8585

8686
### Authentication for a scan
8787

@@ -100,7 +100,7 @@ Your Azure network may allow for communications between your Azure resources, bu
100100
* **System-assigned managed identity (Recommended)** - As soon as the Microsoft Purview Account is created, a system-assigned managed identity (SAMI) is created automatically in Azure AD tenant. Depending on the type of resource, specific RBAC role assignments are required for the Microsoft Purview system-assigned managed identity (SAMI) to perform the scans.
101101

102102
* **User-assigned managed identity** (preview) - Similar to a system managed identity, a user-assigned managed identity (UAMI) is a credential resource that can be used to allow Microsoft Purview to authenticate against Azure Active Directory. For more information, you can see our [User-assigned managed identity guide](manage-credentials.md#create-a-user-assigned-managed-identity).
103-
It is important to give your Microsoft Purview account the permission to scan the Azure Blob data source. You can add access for the SAMI or UAMI at the Subscription, Resource Group, or Resource level, depending on what level scan permission is needed.
103+
It's important to give your Microsoft Purview account the permission to scan the Azure Blob data source. You can add access for the SAMI or UAMI at the Subscription, Resource Group, or Resource level, depending on what level scan permission is needed.
104104

105105
> [!NOTE]
106106
> If you have firewall enabled for the storage account, you must use **managed identity** authentication method when setting up a scan.
@@ -159,14 +159,14 @@ When authentication method selected is **Account Key**, you need to get your acc
159159

160160
1. Select **Create** to complete
161161

162-
1. If your key vault is not connected to Microsoft Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account)
162+
1. If your key vault isn't connected to Microsoft Purview yet, you'll need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account)
163163
1. Finally, [create a new credential](manage-credentials.md#create-a-new-credential) using the key to set up your scan
164164

165165
#### Using Service Principal for scanning
166166

167167
##### Creating a new service principal
168168

169-
If you need to [Create a new service principal](./create-service-principal-azure.md), it is required to register an application in your Azure AD tenant and provide access to Service Principal in your data sources. Your Azure AD Global Administrator or other roles such as Application Administrator can perform this operation.
169+
If you need to [Create a new service principal](./create-service-principal-azure.md), it's required to register an application in your Azure AD tenant and provide access to Service Principal in your data sources. Your Azure AD Global Administrator or other roles such as Application Administrator can perform this operation.
170170

171171
##### Getting the Service Principal's Application ID
172172

@@ -176,7 +176,7 @@ If you need to [Create a new service principal](./create-service-principal-azure
176176

177177
##### Granting the Service Principal access to your Azure Blob account
178178

179-
It is important to give your service principal the permission to scan the Azure Blob data source. You can add access for the service principal at the Subscription, Resource Group, or Resource level, depending on what level scan access is needed.
179+
It's important to give your service principal the permission to scan the Azure Blob data source. You can add access for the service principal at the Subscription, Resource Group, or Resource level, depending on what level scan access is needed.
180180

181181
> [!Note]
182182
> You need to be an owner of the subscription to be able to add a service principal on an Azure resource.
@@ -313,13 +313,13 @@ To map a storage account asset in a received share, you need ONE of the followin
313313
* **Microsoft.Storage/storageAccounts/blobServices/containers/write** - This permission is available in the *Contributor*, *Owner*, *Storage Blob Data Contributor* and *Storage Blob Data Owner* role.
314314

315315
### Update shared data in source storage account
316-
Updates you make to shared files or data in the shared folder from source storage account will be made available to recipient in target storage account in near real time. When you delete subfolder or files within the shared folder, they will disappear for recipient. To delete the shared folder, file or parent folders or containers, you need to first revoke access to all your shares from the source storage account.
316+
Updates you make to shared files or data in the shared folder from source storage account will be made available to recipient in target storage account in near real time. When you delete subfolder or files within the shared folder, they'll disappear for recipient. To delete the shared folder, file or parent folders or containers, you need to first revoke access to all your shares from the source storage account.
317317

318318
### Access shared data in target storage account
319319
The target storage account enables recipient to access the shared data read-only in near real time. You can connect analytics tools such as Synapse Workspace and Databricks to the shared data to perform analytics. Cost of accessing the shared data is charged to the target storage account.
320320

321321
### Service limit
322-
Source storage account can support up to 20 targets, and target storage account can support up to 100 sources. If you require an increase in limit, please contact Support.
322+
Source storage account can support up to 20 targets, and target storage account can support up to 100 sources. If you require an increase in limit, contact Support.
323323

324324
## Access policy
325325

0 commit comments

Comments
 (0)