From e49a7ce48f99b2bed06dd3a2d240333e5190abec Mon Sep 17 00:00:00 2001 From: loukkis <31683781+loukkis@users.noreply.github.com> Date: Thu, 26 Sep 2024 13:37:48 +0300 Subject: [PATCH] Update azure-synapse-link-msi.md Added some alternative options to simplify things. --- .../maker/data-platform/azure-synapse-link-msi.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/powerapps-docs/maker/data-platform/azure-synapse-link-msi.md b/powerapps-docs/maker/data-platform/azure-synapse-link-msi.md index de94dd8bf3..96c5dcb8a2 100644 --- a/powerapps-docs/maker/data-platform/azure-synapse-link-msi.md +++ b/powerapps-docs/maker/data-platform/azure-synapse-link-msi.md @@ -52,7 +52,7 @@ With managed identities, access to your storage account is restricted to request - Provide the Azure subscription ID. - Provide the Azure resource group name. - Provide preferred enterprise policy name. - - Provide the Azure resource group location. + - Provide the enterprise policy location. 1. Save the copy of the **ResourceId** after policy creation. > [!NOTE] @@ -130,6 +130,12 @@ Only the Dynamics 365 and Power Platform admins who were granted the reader role > [!IMPORTANT] > You must have - `Microsoft.Authorization/roleAssignments/write` permissions, such as [User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) or [Owner](/azure/role-based-access-control/built-in-roles#owner) to complete this task. +1. Run from PowerShell prompt ´az ad signed-in-user show --query id --output tsv´ to get current user **ObjectID** +1. Open Azure CLI and run the following command, replacing the `` with the user’s **ObjectID** and the `` with the ResourceId saved from step **Create enterprise policy**. + - `New-AzRoleAssignment -ObjectId -RoleDefinitionName Reader -Scope ` + +OR + 1. Sign into the [Azure portal](https://portal.azure.com/). 1. Obtain the Dynamics 365 Power Platform admin user’s **ObjectID**. 1. Go to the **Users** area.