Skip to content

Commit d9a043b

Browse files
authored
Update register-scan-power-bi-tenant.md
1 parent 3ce9d66 commit d9a043b

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,83 +63,112 @@ Use any of the following deployment checklists during the setup or for troublesh
6363
### Scan same-tenant Power BI using Azure IR and Managed Identity in public network
6464

6565
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
66+
6667
1. Make sure Power BI tenant ID is entered correctly during the registration.
68+
6769
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
70+
6871
1. From Azure portal, validate if Microsoft Purview account Network is set to public access.
72+
6973
1. From Power BI tenant Admin Portal, make sure Power BI tenant is configured to allow public network.
74+
7075
1. In Azure Active Directory tenant, create a security group.
76+
7177
1. From Azure Active Directory tenant, make sure [Microsoft Purview account MSI is member of the new security group](#authenticate-to-power-bi-tenant).
78+
7279
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
7380

7481
# [Public access with Self-hosted IR](#tab/Scenario2)
7582
### Scan same-tenant Power BI using self-hosted IR with Delegated Authentication or Service Principal in public network
7683

7784
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
85+
7886
1. Make sure Power BI tenant ID is entered correctly during the registration.
87+
7988
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
8089
1. From Azure portal, validate if Microsoft Purview account Network is set to public access.
90+
8191
1. From Power BI tenant Admin Portal, make sure Power BI tenant is configured to allow public network.
92+
8293
1. Check your Azure Key Vault to make sure:
8394
1. There are no typos in the password or secret.
8495
2. Microsoft Purview Managed Identity has get/list access to secrets.
96+
8597
1. Review your credential to validate:
8698
1. Client ID matches _Application (Client) ID_ of the app registration.
8799
2. Username includes the user principal name such as `[email protected]`.
100+
88101
1. Validate App registration settings to make sure:
89102
1. App registration exists in your Azure Active Directory tenant.
90103
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
91104
1. Power BI Service Tenant.Read.All
92105
2. Microsoft Graph openid
93106
3. Microsoft Graph User.Read
94107
3. Under **Authentication**, **Allow public client flows** is enabled.
108+
95109
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
96110
1. User is assigned to Power BI Administrator role.
97111
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
98112
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
99113
4. There's no MFA or Conditional Access Policies are enforced on the user.
114+
100115
3. Validate Self-hosted runtime settings:
101116
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
102117
2. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
103118
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled.
104119
4. [JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html) is installed.
120+
105121
1. In Azure Active Directory tenant, create a security group.
122+
106123
1. From Azure Active Directory tenant, make sure [Service Principal is member of the new security group](#authenticate-to-power-bi-tenant).
124+
107125
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
108126

109127
# [Private access](#tab/Scenario3)
110128
### Scan same-tenant Power BI using self-hosted IR with Delegated Authentication or Service Principal in a private network
111129

112130
1. Make sure Power BI and Microsoft Purview accounts are in the same tenant.
131+
113132
1. Make sure Power BI tenant ID is entered correctly during the registration.
133+
114134
1. Make sure your [Power BI Metadata model is up to date by enabling metadata scanning.](/power-bi/admin/service-admin-metadata-scanning-setup#enable-tenant-settings-for-metadata-scanning)
135+
115136
1. Check your Azure Key Vault to make sure:
116137
1. There are no typos in the password.
117138
2. Microsoft Purview Managed Identity has get/list access to secrets.
139+
118140
1. Review your credential to validate:
119141
1. Client ID matches _Application (Client) ID_ of the app registration.
120142
2. Username includes the user principal name such as `[email protected]`.
143+
121144
1. If Delegated Authentication is used, validate Power BI admin user settings to make sure:
122145
1. User is assigned to Power BI Administrator role.
123146
2. At least one [Power BI license](/power-bi/admin/service-admin-licensing-organization#subscription-license-types) is assigned to the user.
124147
3. If user is recently created, sign in with the user at least once to make sure password is reset successfully and user can successfully initiate the session.
125148
4. There's no MFA or Conditional Access Policies are enforced on the user.
149+
126150
1. Validate Self-hosted runtime settings:
127151
1. Latest version of [Self-hosted runtime](https://www.microsoft.com/download/details.aspx?id=39717) is installed on the VM.
128152
2. [JDK 8 or later](https://www.oracle.com/java/technologies/javase-jdk11-downloads.html) is installed.
153+
129154
1. Validate App registration settings to make sure:
130155
1. App registration exists in your Azure Active Directory tenant.
131156
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
132157
1. Power BI Service Tenant.Read.All
133158
2. Microsoft Graph openid
134159
3. Microsoft Graph User.Read
135160
3. Under **Authentication**, **Allow public client flows** is enabled.
161+
136162
2. Review network configuration and validate if:
137163
1. A [private endpoint for Power BI tenant](/power-bi/enterprise/service-security-private-links) is deployed. (Optional)
138164
2. All required [private endpoints for Microsoft Purview](./catalog-private-link-end-to-end.md) are deployed.
139165
3. Network connectivity from Self-hosted runtime to Power BI tenant is enabled.
140166
3. Network connectivity from Self-hosted runtime to Microsoft services is enabled through private network.
167+
141168
1. In Azure Active Directory tenant, create a security group.
169+
142170
1. From Azure Active Directory tenant, make sure [Service Principal is member of the new security group](#authenticate-to-power-bi-tenant).
171+
143172
1. On the Power BI Tenant Admin portal, validate if [Allow service principals to use read-only Power BI admin APIs](#associate-the-security-group-with-power-bi-tenant) is enabled for the new security group.
144173
---
145174

0 commit comments

Comments
 (0)