You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+15-21Lines changed: 15 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 09/09/2022
9
+
ms.date: 09/21/2022
10
10
ms.custom: template-how-to, ignite-fall-2021
11
11
---
12
12
@@ -27,10 +27,10 @@ For a list of metadata available for Power BI, see our [available metadata docum
27
27
|**Scenarios**|**Microsoft Purview public access allowed/denied**|**Power BI public access allowed /denied**|**Runtime option**|**Authentication option**|**Deployment checklist**|
@@ -85,19 +85,19 @@ Use any of the following deployment checklists during the setup or for troublesh
85
85
1. Review your credential to validate:
86
86
1. Client ID matches _Application (Client) ID_ of the app registration.
87
87
2. Username includes the user principal name such as `[email protected]`.
88
-
1. If delegated authentication is used, validate Power BI admin user settings to make sure:
89
-
1. User is assigned to Power BI Administrator role.
90
-
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
91
-
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
92
-
4. There's no MFA or Conditional Access Policies are enforced on the user.
93
88
1. Validate App registration settings to make sure:
94
89
1. App registration exists in your Azure Active Directory tenant.
95
90
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
96
91
1. Power BI Service Tenant.Read.All
97
92
2. Microsoft Graph openid
98
93
3. Microsoft Graph User.Read
99
94
3. Under **Authentication**, **Allow public client flows** is enabled.
100
-
2. Validate Self-hosted runtime settings:
95
+
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
96
+
1. User is assigned to Power BI Administrator role.
97
+
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
98
+
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
99
+
4. There's no MFA or Conditional Access Policies are enforced on the user.
100
+
3. Validate Self-hosted runtime settings:
101
101
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
102
102
2. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
103
103
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled.
@@ -197,7 +197,7 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
197
197
198
198
5. Search for your Microsoft Purview managed identity or service principal and select it.
199
199
200
-
:::image type="content" source="./media/setup-power-bi-scan-PowerShell/add-catalog-to-group-by-search.png" alt-text="Screenshot showing how to add catalog by searching for its name.":::
200
+
:::image type="content" source="./media/setup-power-bi-scan-PowerShell/add-catalog-to-group-by-search.png" alt-text="Screenshot showing how to add catalog by searching for its name.":::
201
201
202
202
You should see a success notification showing you that it was added.
203
203
@@ -231,11 +231,9 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
231
231
> [!Note]
232
232
> You can remove the security group from your developer settings, but the metadata previously extracted won't be removed from the Microsoft Purview account. You can delete it separately, if you wish.
233
233
234
-
### Scan same-tenant Power BI using Azure IR and Managed Identity
234
+
### Create scan for same-tenant Power BI using Azure IR and Managed Identity
235
235
This is a suitable scenario, if both Microsoft Purview and Power BI tenant are configured to allow public access in the network settings.
236
236
237
-
### Create scan
238
-
239
237
To create and run a new scan, do the following:
240
238
241
239
1. In the Microsoft Purview Studio, navigate to the **Data map** in the left menu.
@@ -268,7 +266,7 @@ To create and run a new scan, do the following:
268
266
269
267
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan-managed-identity.png" alt-text="Screenshot of Save and run Power BI source using Managed Identity.":::
270
268
271
-
### Scan same tenant using Self-hosted IR with service principal
269
+
### Create scan for same-tenant using self-hosted IR with service principal
272
270
273
271
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
274
272
@@ -318,8 +316,6 @@ To create and run a new scan, do the following:
318
316
-**Tenant ID**: Your Power BI tenant ID
319
317
-**Client ID**: Use Service Principal Client ID (App ID) you created earlier
320
318
321
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-delegated-authentication.png" alt-text="Screenshot of the new credential menu, showing Power B I credential with all required values supplied.":::
322
-
323
319
1. Select **Test Connection** before continuing to next steps. If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem
324
320
1. Access - Failed status means the user authentication failed. Scans using managed identity will always pass because no user authentication required.
325
321
2. Assets (+ lineage) - Failed status means the Microsoft Purview - Power BI authorization has failed. Make sure the Microsoft Purview managed identity is added to the security group associated in Power BI admin portal.
@@ -333,9 +329,7 @@ To create and run a new scan, do the following:
333
329
334
330
1. On **Review new scan**, select **Save and run** to launch your scan.
335
331
336
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
337
-
338
-
### Scan same tenant using Self-hosted IR with delegated authentication
332
+
### Create scan for same-tenant using self-hosted IR with delegated authentication
339
333
340
334
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
0 commit comments