Skip to content

Commit 3132673

Browse files
authored
Merge pull request #197482 from linda33wj/purview
Clarify AKV credential retrieval when using SHIR
2 parents 0d1f3a8 + 3292ad0 commit 3132673

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

articles/purview/manage-credentials.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: viseshag
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 02/16/2022
9+
ms.date: 05/09/2022
1010
ms.custom: ignite-fall-2021, fasttrack-edit
1111
---
1212

@@ -22,16 +22,18 @@ This article describes how you can create credentials in Microsoft Purview. Thes
2222

2323
A credential is authentication information that Microsoft Purview can use to authenticate to your registered data sources. A credential object can be created for various types of authentication scenarios, such as Basic Authentication requiring username/password. Credential capture specific information required to authenticate, based on the chosen type of authentication method. Credentials use your existing Azure Key Vaults secrets for retrieving sensitive authentication information during the Credential creation process.
2424

25-
In Microsoft Purview, there are few options to use as authentication method to scan data sources such as the following options:
25+
In Microsoft Purview, there are few options to use as authentication method to scan data sources such as the following options. Learn from each [data source article](azure-purview-connector-overview.md) for the its supported authentication.
2626

2727
- [Microsoft Purview system-assigned managed identity](#use-microsoft-purview-system-assigned-managed-identity-to-set-up-scans)
2828
- [User-assigned managed identity](#create-a-user-assigned-managed-identity) (preview)
2929
- Account Key (using [Key Vault](#create-azure-key-vaults-connections-in-your-microsoft-purview-account))
3030
- SQL Authentication (using [Key Vault](#create-azure-key-vaults-connections-in-your-microsoft-purview-account))
3131
- Service Principal (using [Key Vault](#create-azure-key-vaults-connections-in-your-microsoft-purview-account))
3232
- Consumer Key (using [Key Vault](#create-azure-key-vaults-connections-in-your-microsoft-purview-account))
33+
- And more
3334

3435
Before creating any credentials, consider your data source types and networking requirements to decide which authentication method you need for your scenario.
36+
3537
## Use Microsoft Purview system-assigned managed identity to set up scans
3638

3739
If you're using the Microsoft Purview system-assigned managed identity (SAMI) to set up scans, you won't need to create a credential and link your key vault to Microsoft Purview to store them. For detailed instructions on adding the Microsoft Purview SAMI to have access to scan your data sources, refer to the data source-specific authentication sections below:
@@ -72,6 +74,9 @@ At the bottom of the page, under Exception, enable the **Allow trusted Microsoft
7274

7375
To connect to Azure Key Vault with private endpoints, follow [Azure Key Vault's private endpoint documentation](../key-vault/general/private-link-service.md).
7476

77+
> [!NOTE]
78+
> Private endpoint connection option is supported when using Azure integration runtime in [managed virtual network](catalog-managed-vnet.md) to scan the data sources. For self-hosted integration runtime, you need to enable [trusted Microsoft services](#trusted-microsoft-services).
79+
7580
### Microsoft Purview permissions on the Azure Key Vault
7681

7782
Currently Azure Key Vault supports two permission models:

articles/purview/manage-integration-runtimes.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: jingwang
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 04/13/2022
9+
ms.date: 05/09/2022
1010
---
1111

1212
# Create and manage a self-hosted integration runtime
@@ -125,7 +125,6 @@ Your self-hosted integration runtime machine needs to connect to several resourc
125125
* The Microsoft Purview services used to manage the self-hosted integration runtime.
126126
* The data sources you want to scan using the self-hosted integration runtime.
127127
* The managed Storage account and Event Hubs resource created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
128-
* The Azure Key Vault used to store credentials.
129128

130129
There are two firewalls to consider:
131130

@@ -154,7 +153,6 @@ Depending on the sources you want to scan, you also need to allow other domains
154153

155154
| Domain names | Outbound ports | Description |
156155
| ----------------------------- | -------------- | ---------------------------------------- |
157-
| `<your_key_vault_name>.vault.azure.net` | 443 | Required if any credentials are stored in Azure Key Vault. |
158156
| `<your_storage_account>.dfs.core.windows.net` | 443 | When scan Azure Data Lake Store Gen 2. |
159157
| `<your_storage_account>.blob.core.windows.net` | 443 | When scan Azure Blob storage. |
160158
| `<your_sql_server>.database.windows.net` | 1433 | When scan Azure SQL Database. |

0 commit comments

Comments
 (0)