Skip to content

Commit 43514a7

Browse files
authored
Update register-scan-power-bi-tenant-cross-tenant.md
1 parent 5103c11 commit 43514a7

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/purview/register-scan-power-bi-tenant-cross-tenant.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -80,13 +80,13 @@ Use either of the following deployment checklists during the setup, or for troub
8080
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
8181

8282
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
83-
1. Microsoft Graph openid
84-
2. Microsoft Graph User.Read
83+
- Microsoft Graph openid
84+
- Microsoft Graph User.Read
8585

8686
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
87-
1. Power BI Service Tenant.Read.All
88-
2. Microsoft Graph openid
89-
3. Microsoft Graph User.Read
87+
- Power BI Service Tenant.Read.All
88+
- Microsoft Graph openid
89+
- Microsoft Graph User.Read
9090

9191
3. Under **Authentication**:
9292
1. **Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
@@ -123,13 +123,13 @@ Use either of the following deployment checklists during the setup, or for troub
123123
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
124124

125125
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
126-
1. Microsoft Graph openid
127-
2. Microsoft Graph User.Read
126+
- Microsoft Graph openid
127+
- Microsoft Graph User.Read
128128

129129
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
130-
1. Power BI Service Tenant.Read.All
131-
2. Microsoft Graph openid
132-
3. Microsoft Graph User.Read
130+
- Power BI Service Tenant.Read.All
131+
- Microsoft Graph openid
132+
- Microsoft Graph User.Read
133133

134134
3. Under **Authentication**:
135135
1. **Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
@@ -250,7 +250,7 @@ To create and run a new scan by using the Azure runtime, perform the following s
250250

251251
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
252252

253-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in AAD for cross tenant.":::
253+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
254254

255255
3. Take note of the client ID (app ID).
256256

@@ -327,7 +327,7 @@ To create and run a new scan by using the self-hosted integration runtime, perfo
327327

328328
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
329329

330-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in AAD for cross tenant.":::
330+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
331331

332332
2. Take note of the client ID (app ID).
333333

0 commit comments

Comments
 (0)