Skip to content

Commit 816c239

Browse files
authored
Merge pull request #178721 from hophanms/master
added images for pbi
2 parents fd0a415 + 6ca83e0 commit 816c239

File tree

5 files changed

+30
-14
lines changed

5 files changed

+30
-14
lines changed
128 KB
Loading
69.5 KB
Loading
42.9 KB
Loading
62.5 KB
Loading

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 30 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -168,27 +168,38 @@ Use the following steps to register and scan one or more Power BI tenants in Azu
168168

169169
1. Create an App Registration in your Azure Active Directory tenant where Power BI is located. Make sure you update `password` field with a strong password and update `app_display_name` with a non-existent application name in your Azure AD tenant where Power BI tenant is hosted.
170170

171-
```powershell
172-
$SecureStringPassword = ConvertTo-SecureString -String <'password'> -AsPlainText -Force
173-
$AppName = '<app_display_name>'
174-
New-AzADApplication -DisplayName $AppName -Password $SecureStringPassword
175-
```
171+
```powershell
172+
$SecureStringPassword = ConvertTo-SecureString -String <'password'> -AsPlainText -Force
173+
$AppName = '<app_display_name>'
174+
New-AzADApplication -DisplayName $AppName -Password $SecureStringPassword
175+
```
176176
177177
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. Assign the application the following delegated permissions and grant admin consent for the tenant:
178178
179-
- Power BI Service Tenant.Read.All
180-
- Microsoft Graph openid
179+
- Power BI Service Tenant.Read.All
180+
- Microsoft Graph openid
181181
182-
1. From Azure Active Directory dashboard, select newly created application and then select **Authentication**. Under **Supported account types** select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
182+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
183183
184-
1. Construct tenant-specific sign in URL for your service principal by running the following url in your web browser:
184+
1. From Azure Active Directory dashboard, select newly created application and then select **Authentication**. Under **Supported account types** select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
185185
186-
https://login.microsoftonline.com/<purview_tenant_id>/oauth2/v2.0/authorize?client_id=<client_id_to_delegate_the_pbi_admin>&scope=openid&response_type=id_token&response_mode=fragment&state=1234&nonce=67890
186+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-multitenant.png" alt-text="Screenshot of account type support multitenant.":::
187187
188-
Make sure you replace the parameters with correct information:
189-
<purview_tenant_id> is the Azure Active Directory tenant ID (GUID) where Azure Purview account is provisioned.
190-
<client_id_to_delegate_the_pbi_admin> is the application ID corresponding to your service principal
188+
1. Under **Implicit grant and hybrid flows**, ensure to select **ID tokens (used for implicit and hybrid flows)**
189+
190+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-id-token-hybrid-flows.png" alt-text="Screenshot of ID token hybrid flows.":::
191191
192+
1. Construct tenant-specific sign-in URL for your service principal by running the following url in your web browser:
193+
194+
```
195+
https://login.microsoftonline.com/<purview_tenant_id>/oauth2/v2.0/authorize?client_id=<client_id_to_delegate_the_pbi_admin>&scope=openid&response_type=id_token&response_mode=fragment&state=1234&nonce=67890
196+
```
197+
198+
Make sure you replace the parameters with correct information:
199+
200+
- `<purview_tenant_id>` is the Azure Active Directory tenant ID (GUID) where Azure Purview account is provisioned.
201+
- `<client_id_to_delegate_the_pbi_admin>` is the application ID corresponding to your service principal
202+
192203
1. Sign-in using any non-admin account. This is required to provision your service principal in the foreign tenant.
193204
194205
1. When prompted, accept permission requested for _View your basic profile_ and _Maintain access to data you have given it access to_.
@@ -206,7 +217,12 @@ Use the following steps to register and scan one or more Power BI tenants in Azu
206217
$Password = '<pbi_admin_password>'
207218
```
208219
209-
1. In Azure Purview subscription, locate your Purview account and using Azure RBAC roles, assign _Purview Data Source Administrator_ to the Service Principal and the Power BI user.
220+
> [!Note]
221+
> If you create a user account in Azure Active Directory from the portal, the public client flow option is **No** by default. You need to toggle it to **Yes**:
222+
> <br>
223+
> :::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-public-client-flows.png" alt-text="Screenshot of public client flows.":::
224+
225+
1. In Azure Purview Studio, assign _Data Source Admin_ to the Service Principal and the Power BI user at the root collection.
210226
211227
1. To register the cross-tenant Power BI tenant as a new data source inside Azure Purview account, update `service_principal_key` and execute the following cmdlets in the PowerShell session:
212228

0 commit comments

Comments
 (0)