You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/manage-credentials.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: viseshag
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 02/16/2022
9
+
ms.date: 05/09/2022
10
10
ms.custom: ignite-fall-2021, fasttrack-edit
11
11
---
12
12
@@ -22,16 +22,18 @@ This article describes how you can create credentials in Microsoft Purview. Thes
22
22
23
23
A credential is authentication information that Microsoft Purview can use to authenticate to your registered data sources. A credential object can be created for various types of authentication scenarios, such as Basic Authentication requiring username/password. Credential capture specific information required to authenticate, based on the chosen type of authentication method. Credentials use your existing Azure Key Vaults secrets for retrieving sensitive authentication information during the Credential creation process.
24
24
25
-
In Microsoft Purview, there are few options to use as authentication method to scan data sources such as the following options:
25
+
In Microsoft Purview, there are few options to use as authentication method to scan data sources such as the following options. Learn from each [data source article](azure-purview-connector-overview.md) for the its supported authentication.
Before creating any credentials, consider your data source types and networking requirements to decide which authentication method you need for your scenario.
36
+
35
37
## Use Microsoft Purview system-assigned managed identity to set up scans
36
38
37
39
If you're using the Microsoft Purview system-assigned managed identity (SAMI) to set up scans, you won't need to create a credential and link your key vault to Microsoft Purview to store them. For detailed instructions on adding the Microsoft Purview SAMI to have access to scan your data sources, refer to the data source-specific authentication sections below:
@@ -72,6 +74,9 @@ At the bottom of the page, under Exception, enable the **Allow trusted Microsoft
72
74
73
75
To connect to Azure Key Vault with private endpoints, follow [Azure Key Vault's private endpoint documentation](../key-vault/general/private-link-service.md).
74
76
77
+
> [!NOTE]
78
+
> Private endpoint connection option is supported when using Azure integration runtime in [managed virtual network](catalog-managed-vnet.md) to scan the data sources. For self-hosted integration runtime, you need to enable [trusted Microsoft services](#trusted-microsoft-services).
79
+
75
80
### Microsoft Purview permissions on the Azure Key Vault
76
81
77
82
Currently Azure Key Vault supports two permission models:
Copy file name to clipboardExpand all lines: articles/purview/manage-integration-runtimes.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: jingwang
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 04/13/2022
9
+
ms.date: 05/09/2022
10
10
---
11
11
12
12
# Create and manage a self-hosted integration runtime
@@ -125,7 +125,6 @@ Your self-hosted integration runtime machine needs to connect to several resourc
125
125
* The Microsoft Purview services used to manage the self-hosted integration runtime.
126
126
* The data sources you want to scan using the self-hosted integration runtime.
127
127
* The managed Storage account and Event Hubs resource created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
128
-
* The Azure Key Vault used to store credentials.
129
128
130
129
There are two firewalls to consider:
131
130
@@ -154,7 +153,6 @@ Depending on the sources you want to scan, you also need to allow other domains
0 commit comments