Skip to content

Commit 74a8840

Browse files
committed
reword sp notebook
1 parent b4ca96a commit 74a8840

File tree

3 files changed

+15
-11
lines changed

3 files changed

+15
-11
lines changed

notebooks/Capacity Migration.ipynb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,9 @@
8383
"resource_group = '' # Enter the name of the resource group (to be used to create the new F skus)\n",
8484
"\n",
8585
"key_vault_uri = '', # Enter your key vault URI\n",
86-
"key_vault_tenant_id = '', # Enter the key vault secret storig your Tenant ID\n",
87-
"key_vault_client_id = '', # Enter the key vault secret storig your Client ID (Applciation ID)\n",
88-
"key_vault_client_secret = '' # Enter the key vault secret storig your Client Secret"
86+
"key_vault_tenant_id = '', # Enter the key vault key to the secret storing your Tenant ID\n",
87+
"key_vault_client_id = '', # Enter the key vault key to the secret storing your Client ID (Application ID)\n",
88+
"key_vault_client_secret = '' # Enter the key vault key to the secret storing your Client Secret"
8989
]
9090
},
9191
{

notebooks/Service Principal.ipynb

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,9 @@
5858
"\n",
5959
"Here are [additional instructions](https://learn.microsoft.com/fabric/admin/metadata-scanning-enable-read-only-apis) regarding admin read-only APIs. Make sure to read and follow these instructions.\n",
6060
"\n",
61-
"For connecting to Azure Analysis Services (AAS) via Service Principal, add the Service Principal (app) as an admin the AAS instance either in the Azure Portal or using SSMS in this format: `app:<clientid>@<tenantid>`."
61+
"For connecting to Azure Analysis Services (AAS) via Service Principal, add the Service Principal (app) as an admin the AAS instance either in the Azure Portal or using SSMS in this format: `app:<clientid>@<tenantid>`.\n",
62+
"\n",
63+
"**Authentication to retrieve the Key Vault secrets is made using the account which is executing the notebook so please make sure that this account has access to the Key Vault.**"
6264
]
6365
},
6466
{
@@ -81,9 +83,9 @@
8183
"from sempy_labs.tom import connect_semantic_model\n",
8284
"\n",
8385
"key_vault_uri = '' # Enter your key vault URI\n",
84-
"key_vault_tenant_id = '' # Enter the key vault secret storing your Tenant ID\n",
85-
"key_vault_client_id = '' # Enter the key vault secret storing your Client ID (Applciation ID)\n",
86-
"key_vault_client_secret = '' # Enter the key vault secret storing your Client Secret"
86+
"key_vault_tenant_id = '' # Enter the key vault key to the secret storing your Tenant ID\n",
87+
"key_vault_client_id = '' # Enter the key vault key to the secret storing your Client ID (Application ID)\n",
88+
"key_vault_client_secret = '' # Enter the key vault key to the secret storing your Client Secret"
8789
]
8890
},
8991
{
@@ -153,7 +155,9 @@
153155
"id": "fcde09a7",
154156
"metadata": {},
155157
"source": [
156-
"### Use a Service Principal to connect to the Tabular Object Model (also to [Azure Analysis Services](https://learn.microsoft.com/azure/analysis-services/analysis-services-overview))"
158+
"### Use a Service Principal to connect to the Tabular Object Model (also to [Azure Analysis Services](https://learn.microsoft.com/azure/analysis-services/analysis-services-overview))\n",
159+
"\n",
160+
"Note that the Service Principal must have at least read permission to the semantic model to which it is connecting. See [here](https://learn.microsoft.com/power-bi/enterprise/service-premium-service-principal) for more details."
157161
]
158162
},
159163
{

notebooks/Tabular Object Model.ipynb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,9 +95,9 @@
9595
"outputs": [],
9696
"source": [
9797
"key_vault_uri = '' # Enter your key vault URI\n",
98-
"key_vault_tenant_id = '' # Enter the key vault secret storing your Tenant ID\n",
99-
"key_vault_client_id = '' # Enter the key vault secret storing your Client ID (Applciation ID)\n",
100-
"key_vault_client_secret = '' # Enter the key vault secret storing your Client Secret"
98+
"key_vault_tenant_id = '' # Enter the key vault key to the secret storing your Tenant ID\n",
99+
"key_vault_client_id = '' # Enter the key vault key to the secret storing your Client ID (Application ID)\n",
100+
"key_vault_client_secret = '' # Enter the key vault key to the secret storing your Client Secret"
101101
]
102102
},
103103
{

0 commit comments

Comments
 (0)