You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-azure-blob-storage-source.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,23 +25,23 @@ For file types such as csv, tsv, psv, ssv, the schema is extracted when the foll
25
25
26
26
* First row values are non-empty
27
27
* First row values are unique
28
-
* First row values are not a date or a number
28
+
* First row values aren't a date or a number
29
29
30
30
## Prerequisites
31
31
32
32
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33
33
34
34
* An active [Microsoft Purview account](create-catalog-portal.md).
35
35
36
-
* You will need to be a Data Source Administrator and Data Reader to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
36
+
* You'll need to be a Data Source Administrator and Data Reader to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
37
37
38
38
\** Lineage is supported if dataset is used as a source/sink in [Data Factory Copy activity](how-to-link-azure-data-factory.md)
39
39
40
40
## Register
41
41
This section will enable you to register the Azure Blob storage account for scan and data share in Purview.
42
42
43
43
### Prerequisites for register
44
-
* You will need to be a Data Source Admin and one of the other Purview roles (e.g. Data Reader or Data Share Contributor) to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
44
+
* You'll need to be a Data Source Admin and one of the other Purview roles (for example, Data Reader or Data Share Contributor) to register a source and manage it in the Microsoft Purview governance portal. See our [Microsoft Purview Permissions page](catalog-permissions.md) for details.
45
45
46
46
### Steps to register
47
47
@@ -81,7 +81,7 @@ For file types such as csv, tsv, psv, ssv, the schema is extracted when the foll
81
81
82
82
* First row values are non-empty
83
83
* First row values are unique
84
-
* First row values are neither a date nor a number
84
+
* First row values are not a date or a number
85
85
86
86
### Authentication for a scan
87
87
@@ -100,7 +100,7 @@ Your Azure network may allow for communications between your Azure resources, bu
100
100
***System-assigned managed identity (Recommended)** - As soon as the Microsoft Purview Account is created, a system-assigned managed identity (SAMI) is created automatically in Azure AD tenant. Depending on the type of resource, specific RBAC role assignments are required for the Microsoft Purview system-assigned managed identity (SAMI) to perform the scans.
101
101
102
102
***User-assigned managed identity** (preview) - Similar to a system managed identity, a user-assigned managed identity (UAMI) is a credential resource that can be used to allow Microsoft Purview to authenticate against Azure Active Directory. For more information, you can see our [User-assigned managed identity guide](manage-credentials.md#create-a-user-assigned-managed-identity).
103
-
It is important to give your Microsoft Purview account the permission to scan the Azure Blob data source. You can add access for the SAMI or UAMI at the Subscription, Resource Group, or Resource level, depending on what level scan permission is needed.
103
+
It's important to give your Microsoft Purview account the permission to scan the Azure Blob data source. You can add access for the SAMI or UAMI at the Subscription, Resource Group, or Resource level, depending on what level scan permission is needed.
104
104
105
105
> [!NOTE]
106
106
> If you have firewall enabled for the storage account, you must use **managed identity** authentication method when setting up a scan.
@@ -159,14 +159,14 @@ When authentication method selected is **Account Key**, you need to get your acc
159
159
160
160
1. Select **Create** to complete
161
161
162
-
1. If your key vault is not connected to Microsoft Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account)
162
+
1. If your key vault isn't connected to Microsoft Purview yet, you'll need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account)
163
163
1. Finally, [create a new credential](manage-credentials.md#create-a-new-credential) using the key to set up your scan
164
164
165
165
#### Using Service Principal for scanning
166
166
167
167
##### Creating a new service principal
168
168
169
-
If you need to [Create a new service principal](./create-service-principal-azure.md), it is required to register an application in your Azure AD tenant and provide access to Service Principal in your data sources. Your Azure AD Global Administrator or other roles such as Application Administrator can perform this operation.
169
+
If you need to [Create a new service principal](./create-service-principal-azure.md), it's required to register an application in your Azure AD tenant and provide access to Service Principal in your data sources. Your Azure AD Global Administrator or other roles such as Application Administrator can perform this operation.
170
170
171
171
##### Getting the Service Principal's Application ID
172
172
@@ -176,7 +176,7 @@ If you need to [Create a new service principal](./create-service-principal-azure
176
176
177
177
##### Granting the Service Principal access to your Azure Blob account
178
178
179
-
It is important to give your service principal the permission to scan the Azure Blob data source. You can add access for the service principal at the Subscription, Resource Group, or Resource level, depending on what level scan access is needed.
179
+
It's important to give your service principal the permission to scan the Azure Blob data source. You can add access for the service principal at the Subscription, Resource Group, or Resource level, depending on what level scan access is needed.
180
180
181
181
> [!Note]
182
182
> You need to be an owner of the subscription to be able to add a service principal on an Azure resource.
@@ -313,13 +313,13 @@ To map a storage account asset in a received share, you need ONE of the followin
313
313
***Microsoft.Storage/storageAccounts/blobServices/containers/write** - This permission is available in the *Contributor*, *Owner*, *Storage Blob Data Contributor* and *Storage Blob Data Owner* role.
314
314
315
315
### Update shared data in source storage account
316
-
Updates you make to shared files or data in the shared folder from source storage account will be made available to recipient in target storage account in near real time. When you delete subfolder or files within the shared folder, they will disappear for recipient. To delete the shared folder, file or parent folders or containers, you need to first revoke access to all your shares from the source storage account.
316
+
Updates you make to shared files or data in the shared folder from source storage account will be made available to recipient in target storage account in near real time. When you delete subfolder or files within the shared folder, they'll disappear for recipient. To delete the shared folder, file or parent folders or containers, you need to first revoke access to all your shares from the source storage account.
317
317
318
318
### Access shared data in target storage account
319
319
The target storage account enables recipient to access the shared data read-only in near real time. You can connect analytics tools such as Synapse Workspace and Databricks to the shared data to perform analytics. Cost of accessing the shared data is charged to the target storage account.
320
320
321
321
### Service limit
322
-
Source storage account can support up to 20 targets, and target storage account can support up to 100 sources. If you require an increase in limit, please contact Support.
322
+
Source storage account can support up to 20 targets, and target storage account can support up to 100 sources. If you require an increase in limit, contact Support.
0 commit comments