Skip to content

Commit 879f56d

Browse files
Merge pull request #231626 from whhender/patch-88
Update deployment-best-practices.md
2 parents 5d27601 + 2f62035 commit 879f56d

File tree

1 file changed

+3
-39
lines changed

1 file changed

+3
-39
lines changed

articles/purview/deployment-best-practices.md

Lines changed: 3 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: shsandeep123
55
ms.author: sandeepshah
66
ms.service: purview
77
ms.topic: conceptual
8-
ms.date: 08/04/2022
8+
ms.date: 03/21/2023
99
---
1010
# Microsoft Purview (formerly Azure Purview) deployment best practices
1111

@@ -315,45 +315,9 @@ In the Microsoft Purview Data Map, there are several areas where the Catalog Adm
315315

316316
## Moving tenants
317317

318-
If your Azure Subscription moves tenants while you have a Microsoft Purview account, there are some steps you should follow after the move.
318+
If your Azure Subscription moves tenants while you have a Microsoft Purview account, you will need to create a new Microsoft Purview account and re-register and scan your sources.
319319

320-
Currently your Microsoft Purview account's system assigned and user assigned managed identities will be cleared during the move to the new tenant. This is because your Azure tenant houses all authentication information, so these need to be updated for your Microsoft Purview account in the new tenant.
321-
322-
After the move, follow the below steps to clear the old identities, and create new ones:
323-
324-
1. If you're running locally, sign in to Azure through the Azure CLI.
325-
326-
```azurecli-interactive
327-
az login
328-
```
329-
Alternatively, you can use the [Azure Cloud Shell](../cloud-shell/overview.md) in the Azure portal.
330-
Direct browser link: [https://shell.azure.com](https://shell.azure.com).
331-
332-
1. Obtain an access token by using [az account get-access-token](/cli/azure/account#az-account-get-access-token).
333-
```azurecli-interactive
334-
az account get-access-token
335-
```
336-
337-
1. Run the following bash command to disable all managed identities (user and system assigned managed identities):
338-
339-
> [!IMPORTANT]
340-
> Be sure to replace these values in the below commands:
341-
> - \<Subscription_Id>: Your Azure Subscription ID
342-
> - \<Resource_Group_Name>: Name of the resource group where your Microsoft Purview account is housed.
343-
> - \<Account_Name>: Your Microsoft Purview account name
344-
> - \<Access_Token>: The token from the first two steps.
345-
346-
```bash
347-
curl 'https://management.azure.com/subscriptions/<Subscription_Id>/resourceGroups/<Resource_Group_Name>/providers/Microsoft.Purview/accounts/<Account_Name>?api-version=2021-07-01' -X PATCH -d'{"identity":{"type":"None"}}' -H "Content-Type: application/json" -H "Authorization:Bearer <Access_Token>"
348-
```
349-
350-
1. To enable your new system managed assigned identity (SAMI), run the following bash command:
351-
352-
```bash
353-
curl 'https://management.azure.com/subscriptions/<Subscription_Id>/resourceGroups/<Resource_Group_Name>/providers/Microsoft.Purview/accounts/<Account_Name>?api-version=2021-07-01' -X PATCH -d '{"identity":{"type":"SystemAssigned"}}' -H "Content-Type: application/json" -H "Authorization:Bearer <Access_Token>"
354-
```
355-
356-
1. If you had a user assigned managed identity (UAMI), to enable one on your new tenant, register your UAMI in Microsoft Purview as you did originally by following [the steps from the manage credentials article](manage-credentials.md#create-a-user-assigned-managed-identity).
320+
Moving tenants is not currently supported for Microsoft Purview.
357321

358322
## Next steps
359323

0 commit comments

Comments
 (0)