试图通过管道访问ADLS Gen 2文件时的授权问题
我正在尝试使用Azure Synpase中的管道运行Spark Pool Notebook。笔记本读取我的ADLS GEN2的文件。但是当我运行管道时,我将面临这个问题: “此请求无权使用此权限执行此操作。”,403,get,file_name.parquet?timeout = 90,peherizationpermissionmismatch,“此请求无权使用此权限执行此操作。
{“错误”:{{{ “代码”:“ AuthenticationFailed”,“ Message”:“服务器无法验证请求。确保正确形成授权标头的值,包括签名。
I am trying to run my spark pool notebook using pipeline in azure synpase. THe notebook reads files from my ADLS Gen2. But when I am running the pipeline I am facing this issue:
"This request is not authorized to perform this operation using this permission.", 403, GET, file_name.parquet?timeout=90, AuthorizationPermissionMismatch, "This request is not authorized to perform this operation using this permission.
{"error":{"code":"AuthenticationFailed","message":"Server failed to authenticate the request. Make sure the value of Authorization header is formed correctly including the signature.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
我们需要在订阅访问控制(IAM)中赋予对工作区的角色访问。它现在正在工作。
We need to give the role access to workspace as well in the subscription access control (IAM). It is working now.
通常,您通常可以通过两种方式从Synapse访问存储帐户:您的授权/权限和突触托管身份的
身份(您或您的MI)都打算运行笔记本,并且访问您的数据湖必须具有存储blob数据贡献者< /strong>在您的存储帐户的IAM部分中访问,否则您将获得该错误。
如果您的托管身份具有角色,并且您仍然会遇到错误,请确保笔记本电脑作为托管身份而不是您:
There are two ways you typically access your storage accounts from Synapse: Your authorizations/permissions and the Synapse Managed Identity's
Whichever identity (yours or the MI) intended to run the notebook and access your data lake must have Storage Blob Data Contributor access in your storage account's IAM section or you'll get that error.
If your managed identity has the role and you still get the error, make sure your notebook is running as the managed identity and not as you: