You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+3-11Lines changed: 3 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ Use any of the following deployment checklists during the setup or for troublesh
85
85
1. Review your credential to validate:
86
86
1. Client ID matches _Application (Client) ID_ of the app registration.
87
87
2. Username includes the user principal name such as `[email protected]`.
88
-
1. If Delegated Authentication is used, validate Power BI admin user settings to make sure:
88
+
1. If delegated authentication is used, validate Power BI admin user settings to make sure:
89
89
1. User is assigned to Power BI Administrator role.
90
90
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
91
91
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
@@ -231,7 +231,6 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
231
231
> [!Note]
232
232
> You can remove the security group from your developer settings, but the metadata previously extracted won't be removed from the Microsoft Purview account. You can delete it separately, if you wish.
233
233
234
-
235
234
### Scan same-tenant Power BI using Azure IR and Managed Identity
236
235
This is a suitable scenario, if both Microsoft Purview and Power BI tenant are configured to allow public access in the network settings.
237
236
@@ -269,7 +268,7 @@ To create and run a new scan, do the following:
269
268
270
269
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan-managed-identity.png" alt-text="Screenshot of Save and run Power BI source using Managed Identity.":::
271
270
272
-
### Scan same tenant using Self-hosted IR with Service Principal
271
+
### Scan same tenant using Self-hosted IR with service principal
273
272
274
273
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
275
274
@@ -336,14 +335,7 @@ To create and run a new scan, do the following:
336
335
337
336
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
338
337
339
-
340
-
341
-
342
-
343
-
344
-
345
-
346
-
### Scan same tenant using Self-hosted IR with Delegated authentication
338
+
### Scan same tenant using Self-hosted IR with delegated authentication
347
339
348
340
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
0 commit comments