You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+29Lines changed: 29 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,83 +63,112 @@ Use any of the following deployment checklists during the setup or for troublesh
63
63
### Scan same-tenant Power BI using Azure IR and Managed Identity in public network
64
64
65
65
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
66
+
66
67
1. Make sure Power BI tenant ID is entered correctly during the registration.
68
+
67
69
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
70
+
68
71
1. From Azure portal, validate if Microsoft Purview account Network is set to public access.
72
+
69
73
1. From Power BI tenant Admin Portal, make sure Power BI tenant is configured to allow public network.
74
+
70
75
1. In Azure Active Directory tenant, create a security group.
76
+
71
77
1. From Azure Active Directory tenant, make sure [Microsoft Purview account MSI is member of the new security group](#authenticate-to-power-bi-tenant).
78
+
72
79
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
73
80
74
81
# [Public access with Self-hosted IR](#tab/Scenario2)
75
82
### Scan same-tenant Power BI using self-hosted IR with Delegated Authentication or Service Principal in public network
76
83
77
84
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
85
+
78
86
1. Make sure Power BI tenant ID is entered correctly during the registration.
87
+
79
88
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
80
89
1. From Azure portal, validate if Microsoft Purview account Network is set to public access.
90
+
81
91
1. From Power BI tenant Admin Portal, make sure Power BI tenant is configured to allow public network.
92
+
82
93
1. Check your Azure Key Vault to make sure:
83
94
1. There are no typos in the password or secret.
84
95
2. Microsoft Purview Managed Identity has get/list access to secrets.
96
+
85
97
1. Review your credential to validate:
86
98
1. Client ID matches _Application (Client) ID_ of the app registration.
87
99
2. Username includes the user principal name such as `[email protected]`.
100
+
88
101
1. Validate App registration settings to make sure:
89
102
1. App registration exists in your Azure Active Directory tenant.
90
103
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
91
104
1. Power BI Service Tenant.Read.All
92
105
2. Microsoft Graph openid
93
106
3. Microsoft Graph User.Read
94
107
3. Under **Authentication**, **Allow public client flows** is enabled.
108
+
95
109
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
96
110
1. User is assigned to Power BI Administrator role.
97
111
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
98
112
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
99
113
4. There's no MFA or Conditional Access Policies are enforced on the user.
114
+
100
115
3. Validate Self-hosted runtime settings:
101
116
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
102
117
2. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
103
118
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled.
104
119
4.[JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html) is installed.
120
+
105
121
1. In Azure Active Directory tenant, create a security group.
122
+
106
123
1. From Azure Active Directory tenant, make sure [Service Principal is member of the new security group](#authenticate-to-power-bi-tenant).
124
+
107
125
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
108
126
109
127
# [Private access](#tab/Scenario3)
110
128
### Scan same-tenant Power BI using self-hosted IR with Delegated Authentication or Service Principal in a private network
111
129
112
130
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
131
+
113
132
1. Make sure Power BI tenant ID is entered correctly during the registration.
133
+
114
134
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
135
+
115
136
1. Check your Azure Key Vault to make sure:
116
137
1. There are no typos in the password.
117
138
2. Microsoft Purview Managed Identity has get/list access to secrets.
139
+
118
140
1. Review your credential to validate:
119
141
1. Client ID matches _Application (Client) ID_ of the app registration.
120
142
2. Username includes the user principal name such as `[email protected]`.
143
+
121
144
1. If Delegated Authentication is used, validate Power BI admin user settings to make sure:
122
145
1. User is assigned to Power BI Administrator role.
123
146
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
124
147
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
125
148
4. There's no MFA or Conditional Access Policies are enforced on the user.
149
+
126
150
1. Validate Self-hosted runtime settings:
127
151
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
128
152
2.[JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html) is installed.
153
+
129
154
1. Validate App registration settings to make sure:
130
155
1. App registration exists in your Azure Active Directory tenant.
131
156
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
132
157
1. Power BI Service Tenant.Read.All
133
158
2. Microsoft Graph openid
134
159
3. Microsoft Graph User.Read
135
160
3. Under **Authentication**, **Allow public client flows** is enabled.
161
+
136
162
2. Review network configuration and validate if:
137
163
1. A [private endpoint for Power BI tenant](/power-bi/enterprise/service-security-private-links) is deployed. (Optional)
138
164
2. All required [private endpoints for Microsoft Purview](./catalog-private-link-end-to-end.md) are deployed.
139
165
3. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
140
166
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled through private network.
167
+
141
168
1. In Azure Active Directory tenant, create a security group.
169
+
142
170
1. From Azure Active Directory tenant, make sure [Service Principal is member of the new security group](#authenticate-to-power-bi-tenant).
171
+
143
172
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
0 commit comments