Skip to content

Commit 77ee100

Browse files
authored
Update register-scan-power-bi-tenant.md
1 parent 70d5ab6 commit 77ee100

File tree

1 file changed

+15
-21
lines changed

1 file changed

+15
-21
lines changed

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 09/09/2022
9+
ms.date: 09/21/2022
1010
ms.custom: template-how-to, ignite-fall-2021
1111
---
1212

@@ -27,10 +27,10 @@ For a list of metadata available for Power BI, see our [available metadata docum
2727
|**Scenarios** |**Microsoft Purview public access allowed/denied** |**Power BI public access allowed /denied** | **Runtime option** | **Authentication option** | **Deployment checklist** |
2828
|---------|---------|---------|---------|---------|---------|
2929
|Public access with Azure IR |Allowed |Allowed |Azure Runtime | Microsoft Purview Managed Identity | [Review deployment checklist](#deployment-checklist) |
30-
|Public access with Self-hosted IR |Allowed |Allowed |Self-hosted runtime |Delegated Authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
31-
|Private access |Allowed |Denied |Self-hosted runtime |Delegated Authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
32-
|Private access |Denied |Allowed |Self-hosted runtime |Delegated Authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
33-
|Private access |Denied |Denied |Self-hosted runtime |Delegated Authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
30+
|Public access with Self-hosted IR |Allowed |Allowed |Self-hosted runtime |Delegated authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
31+
|Private access |Allowed |Denied |Self-hosted runtime |Delegated authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
32+
|Private access |Denied |Allowed |Self-hosted runtime |Delegated authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
33+
|Private access |Denied |Denied |Self-hosted runtime |Delegated authentication / Service principal| [Review deployment checklist](#deployment-checklist) |
3434

3535
### Known limitations
3636

@@ -85,19 +85,19 @@ Use any of the following deployment checklists during the setup or for troublesh
8585
1. Review your credential to validate:
8686
1. Client ID matches _Application (Client) ID_ of the app registration.
8787
2. Username includes the user principal name such as `[email protected]`.
88-
1. If delegated authentication is used, validate Power BI admin user settings to make sure:
89-
1. User is assigned to Power BI Administrator role.
90-
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
91-
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
92-
4. There's no MFA or Conditional Access Policies are enforced on the user.
9388
1. Validate App registration settings to make sure:
9489
1. App registration exists in your Azure Active Directory tenant.
9590
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
9691
1. Power BI Service Tenant.Read.All
9792
2. Microsoft Graph openid
9893
3. Microsoft Graph User.Read
9994
3. Under **Authentication**, **Allow public client flows** is enabled.
100-
2. Validate Self-hosted runtime settings:
95+
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
96+
1. User is assigned to Power BI Administrator role.
97+
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
98+
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
99+
4. There's no MFA or Conditional Access Policies are enforced on the user.
100+
3. Validate Self-hosted runtime settings:
101101
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
102102
2. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
103103
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled.
@@ -197,7 +197,7 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
197197

198198
5. Search for your Microsoft Purview managed identity or service principal and select it.
199199

200-
:::image type="content" source="./media/setup-power-bi-scan-PowerShell/add-catalog-to-group-by-search.png" alt-text="Screenshot showing how to add catalog by searching for its name.":::
200+
:::image type="content" source="./media/setup-power-bi-scan-PowerShell/add-catalog-to-group-by-search.png" alt-text="Screenshot showing how to add catalog by searching for its name.":::
201201

202202
You should see a success notification showing you that it was added.
203203

@@ -231,11 +231,9 @@ In Azure Active Directory Tenant, where Power BI tenant is located:
231231
> [!Note]
232232
> You can remove the security group from your developer settings, but the metadata previously extracted won't be removed from the Microsoft Purview account. You can delete it separately, if you wish.
233233
234-
### Scan same-tenant Power BI using Azure IR and Managed Identity
234+
### Create scan for same-tenant Power BI using Azure IR and Managed Identity
235235
This is a suitable scenario, if both Microsoft Purview and Power BI tenant are configured to allow public access in the network settings.
236236

237-
### Create scan
238-
239237
To create and run a new scan, do the following:
240238

241239
1. In the Microsoft Purview Studio, navigate to the **Data map** in the left menu.
@@ -268,7 +266,7 @@ To create and run a new scan, do the following:
268266

269267
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan-managed-identity.png" alt-text="Screenshot of Save and run Power BI source using Managed Identity.":::
270268

271-
### Scan same tenant using Self-hosted IR with service principal
269+
### Create scan for same-tenant using self-hosted IR with service principal
272270

273271
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
274272

@@ -318,8 +316,6 @@ To create and run a new scan, do the following:
318316
- **Tenant ID**: Your Power BI tenant ID
319317
- **Client ID**: Use Service Principal Client ID (App ID) you created earlier
320318

321-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-delegated-authentication.png" alt-text="Screenshot of the new credential menu, showing Power B I credential with all required values supplied.":::
322-
323319
1. Select **Test Connection** before continuing to next steps. If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem
324320
1. Access - Failed status means the user authentication failed. Scans using managed identity will always pass because no user authentication required.
325321
2. Assets (+ lineage) - Failed status means the Microsoft Purview - Power BI authorization has failed. Make sure the Microsoft Purview managed identity is added to the security group associated in Power BI admin portal.
@@ -333,9 +329,7 @@ To create and run a new scan, do the following:
333329

334330
1. On **Review new scan**, select **Save and run** to launch your scan.
335331

336-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
337-
338-
### Scan same tenant using Self-hosted IR with delegated authentication
332+
### Create scan for same-tenant using self-hosted IR with delegated authentication
339333

340334
This scenario can be used when Microsoft Purview and Power BI tenant or both, are configured to use private endpoint and deny public access. Additionally, this option is also applicable if Microsoft Purview and Power BI tenant are configured to allow public access.
341335

0 commit comments

Comments
 (0)