Skip to content

Commit 5752d31

Browse files
authored
Update register-scan-power-bi-tenant.md
1 parent dc0d35d commit 5752d31

File tree

1 file changed

+3
-11
lines changed

1 file changed

+3
-11
lines changed

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Use any of the following deployment checklists during the setup or for troublesh
8585
1. Review your credential to validate:
8686
1. Client ID matches _Application (Client) ID_ of the app registration.
8787
2. Username includes the user principal name such as `[email protected]`.
88-
1. If Delegated Authentication is used, validate Power BI admin user settings to make sure:
88+
1. If delegated authentication is used, validate Power BI admin user settings to make sure:
8989
1. User is assigned to Power BI Administrator role.
9090
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
9191
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
@@ -231,7 +231,6 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
231231
> [!Note]
232232
> You can remove the security group from your developer settings, but the metadata previously extracted won't be removed from the Microsoft Purview account. You can delete it separately, if you wish.
233233
234-
235234
### Scan same-tenant Power BI using Azure IR and Managed Identity
236235
This is a suitable scenario, if both Microsoft Purview and Power BI tenant are configured to allow public access in the network settings.
237236

@@ -269,7 +268,7 @@ To create and run a new scan, do the following:
269268

270269
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan-managed-identity.png" alt-text="Screenshot of Save and run Power BI source using Managed Identity.":::
271270

272-
### Scan same tenant using Self-hosted IR with Service Principal
271+
### Scan same tenant using Self-hosted IR with service principal
273272

274273
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
275274

@@ -336,14 +335,7 @@ To create and run a new scan, do the following:
336335

337336
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
338337

339-
340-
341-
342-
343-
344-
345-
346-
### Scan same tenant using Self-hosted IR with Delegated authentication
338+
### Scan same tenant using Self-hosted IR with delegated authentication
347339

348340
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
349341

0 commit comments

Comments
 (0)