Skip to content

Commit 3e353c1

Browse files
authored
Update register-scan-power-bi-tenant.md
1 parent 43514a7 commit 3e353c1

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -102,13 +102,13 @@ Use any of the following deployment checklists during the setup or for troublesh
102102
1. App registration exists in your Azure Active Directory tenant.
103103

104104
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
105-
1. Microsoft Graph openid
106-
2. Microsoft Graph User.Read
105+
- Microsoft Graph openid
106+
- Microsoft Graph User.Read
107107

108108
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
109-
1. Power BI Service Tenant.Read.All
110-
2. Microsoft Graph openid
111-
3. Microsoft Graph User.Read
109+
- Power BI Service Tenant.Read.All
110+
- Microsoft Graph openid
111+
- Microsoft Graph User.Read
112112

113113
3. Under **Authentication**, **Allow public client flows** is enabled.
114114

@@ -161,13 +161,13 @@ Use any of the following deployment checklists during the setup or for troublesh
161161
1. App registration exists in your Azure Active Directory tenant.
162162

163163
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
164-
1. Microsoft Graph openid
165-
2. Microsoft Graph User.Read
164+
- Microsoft Graph openid
165+
- Microsoft Graph User.Read
166166

167167
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
168-
1. Power BI Service Tenant.Read.All
169-
2. Microsoft Graph openid
170-
3. Microsoft Graph User.Read
168+
- Power BI Service Tenant.Read.All
169+
- Microsoft Graph openid
170+
- Microsoft Graph User.Read
171171

172172
3. Under **Authentication**, **Allow public client flows** is enabled.
173173

@@ -319,7 +319,7 @@ To create and run a new scan, do the following:
319319

320320
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** and create an App Registration in the tenant. Provide a web URL in the **Redirect URI**.
321321

322-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
322+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
323323

324324
2. Take note of Client ID(App ID).
325325

@@ -417,7 +417,7 @@ To create and run a new scan, do the following:
417417

418418
1. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**.
419419

420-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
420+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
421421

422422
2. Take note of Client ID(App ID).
423423

0 commit comments

Comments
 (0)