You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,13 +102,13 @@ Use any of the following deployment checklists during the setup or for troublesh
102
102
1. App registration exists in your Azure Active Directory tenant.
103
103
104
104
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
105
-
1. Microsoft Graph openid
106
-
2. Microsoft Graph User.Read
105
+
- Microsoft Graph openid
106
+
- Microsoft Graph User.Read
107
107
108
108
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
109
-
1. Power BI Service Tenant.Read.All
110
-
2. Microsoft Graph openid
111
-
3. Microsoft Graph User.Read
109
+
- Power BI Service Tenant.Read.All
110
+
- Microsoft Graph openid
111
+
- Microsoft Graph User.Read
112
112
113
113
3. Under **Authentication**, **Allow public client flows** is enabled.
114
114
@@ -161,13 +161,13 @@ Use any of the following deployment checklists during the setup or for troublesh
161
161
1. App registration exists in your Azure Active Directory tenant.
162
162
163
163
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
164
-
1. Microsoft Graph openid
165
-
2. Microsoft Graph User.Read
164
+
- Microsoft Graph openid
165
+
- Microsoft Graph User.Read
166
166
167
167
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
168
-
1. Power BI Service Tenant.Read.All
169
-
2. Microsoft Graph openid
170
-
3. Microsoft Graph User.Read
168
+
- Power BI Service Tenant.Read.All
169
+
- Microsoft Graph openid
170
+
- Microsoft Graph User.Read
171
171
172
172
3. Under **Authentication**, **Allow public client flows** is enabled.
173
173
@@ -319,7 +319,7 @@ To create and run a new scan, do the following:
319
319
320
320
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** and create an App Registration in the tenant. Provide a web URL in the **Redirect URI**.
321
321
322
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
322
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
323
323
324
324
2. Take note of Client ID(App ID).
325
325
@@ -417,7 +417,7 @@ To create and run a new scan, do the following:
417
417
418
418
1. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**.
419
419
420
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
420
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
0 commit comments