You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+37-18Lines changed: 37 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 02/02/2022
9
+
ms.date: 03/04/2022
10
10
ms.custom: template-how-to, ignite-fall-2021
11
11
---
12
12
@@ -48,12 +48,14 @@ This article outlines how to register a Power BI tenant, and how to authenticate
48
48
49
49
- You will need to be a Data Source Administrator and Data Reader to register a source and manage it in the Azure Purview Studio. See our [Azure Purview Permissions page](catalog-permissions.md) for details.
50
50
51
+
- If delegated auth is used, make sure proper [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to Power BI admin user that is used for the scan.
52
+
51
53
- If self-hosted integration runtime is used:
52
54
53
55
- Set up the latest [self-hosted integration runtime](https://www.microsoft.com/download/details.aspx?id=39717). The minimum required version is 5.14.8055.1. For more information, see[the create and configure a self-hosted integration runtime guide](manage-integration-runtimes.md).
54
56
55
57
- Ensure [JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html), is installed on the virtual machine where the self-hosted integration runtime is installed.
56
-
58
+
57
59
## Same Power BI tenant registration and scan
58
60
59
61
### Authentication options
@@ -192,6 +194,8 @@ To create and run a new scan, do the following:
192
194
193
195
1. Create a user account in Azure Active Directory tenant and assign the user to Azure Active Directory role, **Power BI Administrator**. Take note of username and login to change the password.
194
196
197
+
3. Assign proper Power BI license to the user.
198
+
195
199
2. Navigate to your Azure key vault.
196
200
197
201
3. Select **Settings** > **Secrets** and select **+ Generate/Import**.
@@ -204,14 +208,15 @@ To create and run a new scan, do the following:
204
208
205
209
5. If your key vault is not connected to Azure Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-azure-purview-account)
206
210
207
-
6. Create an App Registration in your Azure Active Directory tenant. Take note of Client ID(App ID).
211
+
6. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**. Take note of Client ID(App ID).
208
212
209
213
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
210
214
211
-
7. From Azure Active Directory dashboard, select newly created application and then select App registration. Assign the application the following delegated permissions and grant admin consent for the tenant:
215
+
7. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
212
216
213
217
- Power BI Service Tenant.Read.All
214
218
- Microsoft Graph openid
219
+
- Microsoft Graph User.Read
215
220
216
221
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
217
222
@@ -289,6 +294,8 @@ To create and run a new scan using Azure runtime, perform the following steps:
289
294
290
295
1. Create a user account in Azure Active Directory tenant where Power BI tenant is located and assign the user to Azure Active Directory role, **Power BI Administrator**. Take note of username and login to change the password.
291
296
297
+
2. Assign proper Power BI license to the user.
298
+
292
299
2. Navigate to your Azure key vault in the tenant where Azure Purview is created.
293
300
294
301
3. Select **Settings** > **Secrets** and select **+ Generate/Import**.
@@ -301,14 +308,15 @@ To create and run a new scan using Azure runtime, perform the following steps:
301
308
302
309
6. If your key vault is not connected to Azure Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-azure-purview-account)
303
310
304
-
7. Create an App Registration in your Azure Active Directory tenant where Power BI is located. Take note of Client ID(App ID).
311
+
7. Create an App Registration in your Azure Active Directory tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of Client ID(App ID).
305
312
306
313
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service Principle.":::
307
314
308
315
8. From Azure Active Directory dashboard, select newly created application and then select App registration. Assign the application the following delegated permissions and grant admin consent for the tenant:
309
316
310
317
- Power BI Service Tenant.Read.All
311
318
- Microsoft Graph openid
319
+
- Microsoft Graph User.Read
312
320
313
321
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
314
322
@@ -320,28 +328,28 @@ To create and run a new scan using Azure runtime, perform the following steps:
320
328
321
329
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-id-token-hybrid-flows.png" alt-text="Screenshot of ID token hybrid flows.":::
322
330
323
-
In the Azure Purview Studio, navigate to the **Data map** in the left menu.
331
+
11. Under **Advanced settings**, enable **Allow Public client flows**.
324
332
325
-
9. Navigate to **Sources**.
333
+
12. In the Azure Purview Studio, navigate to the **Data map** in the left menu. Navigate to **Sources**.
326
334
327
-
10. Select the registered Power BI source from cross tenant.
335
+
13. Select the registered Power BI source from cross tenant.
328
336
329
-
11. Select **+ New scan**.
337
+
14. Select **+ New scan**.
330
338
331
-
12. Give your scan a name. Then select the option to include or exclude the personal workspaces.
339
+
15. Give your scan a name. Then select the option to include or exclude the personal workspaces.
332
340
333
341
> [!Note]
334
342
> Switching the configuration of a scan to include or exclude a personal workspace will trigger a full scan of PowerBI source.
335
343
336
-
13. Select **Azure AutoResolveIntegrationRuntime** from the drop-down list.
344
+
16. Select **Azure AutoResolveIntegrationRuntime** from the drop-down list.
337
345
338
346
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant.png" alt-text="Image showing Power BI scan setup using Azure IR for cross tenant.":::
339
347
340
-
14. For the **Credential**, select **Delegated authentication** and click **+ New** to create a new credential.
348
+
17. For the **Credential**, select **Delegated authentication** and click **+ New** to create a new credential.
341
349
342
350
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-shir.png" alt-text="Image showing Power BI scan setup using SHIR.":::
343
351
344
-
15. Create a new credential and provide required parameters:
352
+
18. Create a new credential and provide required parameters:
345
353
346
354
-**Name**: Provide a unique name for credential.
347
355
@@ -353,21 +361,32 @@ In the Azure Purview Studio, navigate to the **Data map** in the left menu.
353
361
354
362
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-delegated-authentication.png" alt-text="Image showing Power BI scan setup using Delegated authentication.":::
355
363
356
-
16. Select **Test Connection** before continuing to next steps. If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem
357
-
1. Access - Failed status means the user authentication failed. Scans using managed identity will always pass because no user authentication required.
358
-
2. Assets (+ lineage) - Failed status means the Azure Purview - Power BI authorization has failed. Make sure the Azure Purview managed identity is added to the security group associated in Power BI admin portal.
359
-
3. Detailed metadata (Enhanced) - Failed status means the Power BI admin portal is disabled for the following setting - **Enhance admin APIs responses with detailed metadata**
364
+
19. Select **Test Connection** before continuing to next steps.
360
365
361
366
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-test.png" alt-text="Screenshot of test connection status.":::
362
367
363
-
17. Set up a scan trigger. Your options are **Recurring**, and **Once**.
368
+
If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem:
369
+
370
+
1. Access - Failed status means the user authentication failed: Validate if username and password is correct. review if the Credential contains correct Client (App) ID from the App Registration.
371
+
2. Assets (+ lineage) - Failed status means the Azure Purview - Power BI authorization has failed. Make sure the user is added to Power BI Administrator role and has proper Power BI license assigned to.
372
+
3. Detailed metadata (Enhanced) - Failed status means the Power BI admin portal is disabled for the following setting - **Enhance admin APIs responses with detailed metadata**
373
+
374
+
20. Set up a scan trigger. Your options are **Recurring**, and **Once**.
364
375
365
376
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/scan-trigger.png" alt-text="Screenshot of the Azure Purview scan scheduler.":::
366
377
367
378
18. On **Review new scan**, select **Save and run** to launch your scan.
368
379
369
380
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
370
381
382
+
## Troubleshooting tips
383
+
384
+
If delegated auth is used:
385
+
- Check your key vault. Make sure there are no typos in the password.
386
+
- Assign proper [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) to Power BI administrator user.
387
+
- Validate if user is assigned to Power BI Administrator role.
388
+
- If user is recently created, make sure password is reset successfully and user can successfully initiate the session.
389
+
371
390
## Next steps
372
391
373
392
Now that you have registered your source, follow the below guides to learn more about Azure Purview and your data.
0 commit comments