Skip to content

Commit c19faa7

Browse files
authored
Merge pull request #190679 from zeinab-mk/patch-7
Update register-scan-power-bi-tenant
2 parents a1c3824 + bb5feeb commit c19faa7

File tree

1 file changed

+37
-18
lines changed

1 file changed

+37
-18
lines changed

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 37 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 02/02/2022
9+
ms.date: 03/04/2022
1010
ms.custom: template-how-to, ignite-fall-2021
1111
---
1212

@@ -48,12 +48,14 @@ This article outlines how to register a Power BI tenant, and how to authenticate
4848

4949
- You will need to be a Data Source Administrator and Data Reader to register a source and manage it in the Azure Purview Studio. See our [Azure Purview Permissions page](catalog-permissions.md) for details.
5050

51+
- If delegated auth is used, make sure proper [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to Power BI admin user that is used for the scan.
52+
5153
- If self-hosted integration runtime is used:
5254

5355
- Set up the latest [self-hosted integration runtime](https://www.microsoft.com/download/details.aspx?id=39717). The minimum required version is 5.14.8055.1. For more information, see[the create and configure a self-hosted integration runtime guide](manage-integration-runtimes.md).
5456

5557
- Ensure [JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html), is installed on the virtual machine where the self-hosted integration runtime is installed.
56-
58+
5759
## Same Power BI tenant registration and scan
5860

5961
### Authentication options
@@ -192,6 +194,8 @@ To create and run a new scan, do the following:
192194

193195
1. Create a user account in Azure Active Directory tenant and assign the user to Azure Active Directory role, **Power BI Administrator**. Take note of username and login to change the password.
194196

197+
3. Assign proper Power BI license to the user.
198+
195199
2. Navigate to your Azure key vault.
196200

197201
3. Select **Settings** > **Secrets** and select **+ Generate/Import**.
@@ -204,14 +208,15 @@ To create and run a new scan, do the following:
204208

205209
5. If your key vault is not connected to Azure Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-azure-purview-account)
206210

207-
6. Create an App Registration in your Azure Active Directory tenant. Take note of Client ID(App ID).
211+
6. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**. Take note of Client ID(App ID).
208212

209213
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
210214

211-
7. From Azure Active Directory dashboard, select newly created application and then select App registration. Assign the application the following delegated permissions and grant admin consent for the tenant:
215+
7. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
212216

213217
- Power BI Service Tenant.Read.All
214218
- Microsoft Graph openid
219+
- Microsoft Graph User.Read
215220

216221
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
217222

@@ -289,6 +294,8 @@ To create and run a new scan using Azure runtime, perform the following steps:
289294

290295
1. Create a user account in Azure Active Directory tenant where Power BI tenant is located and assign the user to Azure Active Directory role, **Power BI Administrator**. Take note of username and login to change the password.
291296

297+
2. Assign proper Power BI license to the user.
298+
292299
2. Navigate to your Azure key vault in the tenant where Azure Purview is created.
293300

294301
3. Select **Settings** > **Secrets** and select **+ Generate/Import**.
@@ -301,14 +308,15 @@ To create and run a new scan using Azure runtime, perform the following steps:
301308

302309
6. If your key vault is not connected to Azure Purview yet, you will need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-azure-purview-account)
303310

304-
7. Create an App Registration in your Azure Active Directory tenant where Power BI is located. Take note of Client ID (App ID).
311+
7. Create an App Registration in your Azure Active Directory tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of Client ID(App ID).
305312

306313
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service Principle.":::
307314

308315
8. From Azure Active Directory dashboard, select newly created application and then select App registration. Assign the application the following delegated permissions and grant admin consent for the tenant:
309316

310317
- Power BI Service Tenant.Read.All
311318
- Microsoft Graph openid
319+
- Microsoft Graph User.Read
312320

313321
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
314322

@@ -320,28 +328,28 @@ To create and run a new scan using Azure runtime, perform the following steps:
320328

321329
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-id-token-hybrid-flows.png" alt-text="Screenshot of ID token hybrid flows.":::
322330

323-
In the Azure Purview Studio, navigate to the **Data map** in the left menu.
331+
11. Under **Advanced settings**, enable **Allow Public client flows**.
324332

325-
9. Navigate to **Sources**.
333+
12. In the Azure Purview Studio, navigate to the **Data map** in the left menu. Navigate to **Sources**.
326334

327-
10. Select the registered Power BI source from cross tenant.
335+
13. Select the registered Power BI source from cross tenant.
328336

329-
11. Select **+ New scan**.
337+
14. Select **+ New scan**.
330338

331-
12. Give your scan a name. Then select the option to include or exclude the personal workspaces.
339+
15. Give your scan a name. Then select the option to include or exclude the personal workspaces.
332340

333341
> [!Note]
334342
> Switching the configuration of a scan to include or exclude a personal workspace will trigger a full scan of PowerBI source.
335343
336-
13. Select **Azure AutoResolveIntegrationRuntime** from the drop-down list.
344+
16. Select **Azure AutoResolveIntegrationRuntime** from the drop-down list.
337345

338346
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant.png" alt-text="Image showing Power BI scan setup using Azure IR for cross tenant.":::
339347

340-
14. For the **Credential**, select **Delegated authentication** and click **+ New** to create a new credential.
348+
17. For the **Credential**, select **Delegated authentication** and click **+ New** to create a new credential.
341349

342350
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-shir.png" alt-text="Image showing Power BI scan setup using SHIR.":::
343351

344-
15. Create a new credential and provide required parameters:
352+
18. Create a new credential and provide required parameters:
345353

346354
- **Name**: Provide a unique name for credential.
347355

@@ -353,21 +361,32 @@ In the Azure Purview Studio, navigate to the **Data map** in the left menu.
353361

354362
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-delegated-authentication.png" alt-text="Image showing Power BI scan setup using Delegated authentication.":::
355363

356-
16. Select **Test Connection** before continuing to next steps. If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem
357-
1. Access - Failed status means the user authentication failed. Scans using managed identity will always pass because no user authentication required.
358-
2. Assets (+ lineage) - Failed status means the Azure Purview - Power BI authorization has failed. Make sure the Azure Purview managed identity is added to the security group associated in Power BI admin portal.
359-
3. Detailed metadata (Enhanced) - Failed status means the Power BI admin portal is disabled for the following setting - **Enhance admin APIs responses with detailed metadata**
364+
19. Select **Test Connection** before continuing to next steps.
360365

361366
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-test.png" alt-text="Screenshot of test connection status.":::
362367

363-
17. Set up a scan trigger. Your options are **Recurring**, and **Once**.
368+
If **Test Connection** failed, select **View Report** to see the detailed status and troubleshoot the problem:
369+
370+
1. Access - Failed status means the user authentication failed: Validate if username and password is correct. review if the Credential contains correct Client (App) ID from the App Registration.
371+
2. Assets (+ lineage) - Failed status means the Azure Purview - Power BI authorization has failed. Make sure the user is added to Power BI Administrator role and has proper Power BI license assigned to.
372+
3. Detailed metadata (Enhanced) - Failed status means the Power BI admin portal is disabled for the following setting - **Enhance admin APIs responses with detailed metadata**
373+
374+
20. Set up a scan trigger. Your options are **Recurring**, and **Once**.
364375

365376
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/scan-trigger.png" alt-text="Screenshot of the Azure Purview scan scheduler.":::
366377

367378
18. On **Review new scan**, select **Save and run** to launch your scan.
368379

369380
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/save-run-power-bi-scan.png" alt-text="Screenshot of Save and run Power BI source.":::
370381

382+
## Troubleshooting tips
383+
384+
If delegated auth is used:
385+
- Check your key vault. Make sure there are no typos in the password.
386+
- Assign proper [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) to Power BI administrator user.
387+
- Validate if user is assigned to Power BI Administrator role.
388+
- If user is recently created, make sure password is reset successfully and user can successfully initiate the session.
389+
371390
## Next steps
372391

373392
Now that you have registered your source, follow the below guides to learn more about Azure Purview and your data.

0 commit comments

Comments
 (0)