Skip to content

Commit e99825d

Browse files
authored
Pencil edits
Acrolinx (id > ID, line 84); delete period from heading (line 63); lowercase term (line 77); formatting (lines 84-87).
1 parent 9cae21a commit e99825d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/purview/tutorial-using-rest-apis.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ its password. Here's how:
6060

6161
:::image type="content" source="./media/tutorial-using-rest-apis/client-secret.png" alt-text="Screenshot showing a client secret.":::
6262

63-
## Set up authentication using service principal.
63+
## Set up authentication using service principal
6464

6565
Once service principal is created, you need to assign Data plane roles of your purview account to the service principal created above. The below steps need to be followed to assign role to establish trust between the service principal and purview account.
6666

@@ -74,17 +74,17 @@ Once service principal is created, you need to assign Data plane roles of your p
7474
1. 'Data Source Administrator' role to access Scanning Data plane.
7575
1. 'Collection Admin' role to access Account Data Plane.
7676

77-
## Get Token
77+
## Get token
7878
You can send a POST request to the following URL to get access token.
7979

8080
https://login.microsoftonline.com/{your-tenant-id}/oauth2/token
8181

8282
The following parameters needs to be passed to the above URL.
8383

84-
client_id: client id of the application registered in Azure Active directory and is assigned to a data plane role for the Purview account.
85-
client_secret: client secret created for the above application.
86-
grant_type: This should be ‘client_credentials’.
87-
resource: This should be ‘https://purview.azure.net’
84+
- **client_id**: client ID of the application registered in Azure Active directory and is assigned to a data plane role for the Purview account.
85+
- **client_secret**: client secret created for the above application.
86+
- **grant_type**: This should be ‘client_credentials’.
87+
- **resource**: This should be ‘https://purview.azure.net’
8888

8989
Sample response token:
9090

0 commit comments

Comments
 (0)