You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant-cross-tenant.md
+34-15Lines changed: 34 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 09/22/2022
9
+
ms.date: 10/24/2022
10
10
ms.custom: template-how-to, ignite-fall-2021
11
11
---
12
12
@@ -78,10 +78,16 @@ Use either of the following deployment checklists during the setup, or for troub
78
78
79
79
1. In the Power BI Azure AD tenant, validate the following app registration settings:
80
80
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
81
-
2. Under **API permissions**, the following APIs are set up with **read** for **delegated permissions** and **grant admin consent for the tenant**:
82
-
1. Power BI Service Tenant.Read.All
83
-
2. Microsoft Graph openid
84
-
3. Microsoft Graph User.Read
81
+
82
+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
83
+
- Microsoft Graph openid
84
+
- Microsoft Graph User.Read
85
+
86
+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
87
+
- Power BI Service Tenant.Read.All
88
+
- Microsoft Graph openid
89
+
- Microsoft Graph User.Read
90
+
85
91
3. Under **Authentication**:
86
92
1.**Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
87
93
2.**Implicit grant and hybrid flows** > **ID tokens (used for implicit and hybrid flows)** is selected.
@@ -115,10 +121,16 @@ Use either of the following deployment checklists during the setup, or for troub
115
121
116
122
1. In the Power BI Azure AD tenant, validate the following app registration settings:
117
123
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
118
-
2. Under **API permissions**, the following APIs are set up with **read** for **delegated permissions** and **grant admin consent for the tenant**:
119
-
1. Power BI Service Tenant.Read.All
120
-
2. Microsoft Graph openid
121
-
3. Microsoft Graph User.Read
124
+
125
+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
126
+
- Microsoft Graph openid
127
+
- Microsoft Graph User.Read
128
+
129
+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
130
+
- Power BI Service Tenant.Read.All
131
+
- Microsoft Graph openid
132
+
- Microsoft Graph User.Read
133
+
122
134
3. Under **Authentication**:
123
135
1.**Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
124
136
2.**Implicit grant and hybrid flows** > **ID tokens (used for implicit and hybrid flows)** is selected.
@@ -236,7 +248,11 @@ To create and run a new scan by using the Azure runtime, perform the following s
236
248
237
249
1. If your key vault isn't connected to Microsoft Purview yet, you need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account).
238
250
239
-
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of the client ID (app ID).
251
+
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
252
+
253
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
254
+
255
+
3. Take note of the client ID (app ID).
240
256
241
257
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot that shows how to create a service principle.":::
242
258
@@ -246,7 +262,7 @@ To create and run a new scan by using the Azure runtime, perform the following s
246
262
- Microsoft Graph openid
247
263
- Microsoft Graph User.Read
248
264
249
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI and Microsoft Graph.":::
265
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions on Power BI and Microsoft Graph.":::
250
266
251
267
1. From the Azure AD dashboard, select the newly created application, and then select **Authentication**. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
252
268
@@ -309,17 +325,20 @@ To create and run a new scan by using the Azure runtime, perform the following s
309
325
310
326
To create and run a new scan by using the self-hosted integration runtime, perform the following steps:
311
327
312
-
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of the client ID (app ID).
328
+
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
329
+
330
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
331
+
332
+
2. Take note of the client ID (app ID).
313
333
314
334
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot that shows how to create a service principle.":::
315
335
316
-
1. From the Azure AD dashboard, select the newly created application, and then select **App permissions**. Assign the application the following delegated permissions, and grant admin consent for the tenant:
336
+
1. From the Azure AD dashboard, select the newly created application, and then select **App permissions**. Assign the application the following delegated permissions:
317
337
318
-
- Power BI Service Tenant.Read.All
319
338
- Microsoft Graph openid
320
339
- Microsoft Graph User.Read
321
340
322
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI and Microsoft Graph.":::
341
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-spn-api-permissions.png" alt-text="Screenshot of delegated permissions on Microsoft Graph.":::
323
342
324
343
1. From the Azure AD dashboard, select the newly created application, and then select **Authentication**. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
Copy file name to clipboardExpand all lines: articles/purview/register-scan-power-bi-tenant.md
+27-16Lines changed: 27 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 10/19/2022
9
+
ms.date: 10/24/2022
10
10
ms.custom: template-how-to, ignite-fall-2021
11
11
---
12
12
@@ -100,10 +100,16 @@ Use any of the following deployment checklists during the setup or for troublesh
100
100
101
101
1. Validate App registration settings to make sure:
102
102
1. App registration exists in your Azure Active Directory tenant.
103
-
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
104
-
1. Power BI Service Tenant.Read.All
105
-
2. Microsoft Graph openid
106
-
3. Microsoft Graph User.Read
103
+
104
+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
105
+
- Microsoft Graph openid
106
+
- Microsoft Graph User.Read
107
+
108
+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
109
+
- Power BI Service Tenant.Read.All
110
+
- Microsoft Graph openid
111
+
- Microsoft Graph User.Read
112
+
107
113
3. Under **Authentication**, **Allow public client flows** is enabled.
108
114
109
115
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
@@ -153,10 +159,16 @@ Use any of the following deployment checklists during the setup or for troublesh
153
159
154
160
1. Validate App registration settings to make sure:
155
161
1. App registration exists in your Azure Active Directory tenant.
156
-
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
157
-
1. Power BI Service Tenant.Read.All
158
-
2. Microsoft Graph openid
159
-
3. Microsoft Graph User.Read
162
+
163
+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
164
+
- Microsoft Graph openid
165
+
- Microsoft Graph User.Read
166
+
167
+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
168
+
- Power BI Service Tenant.Read.All
169
+
- Microsoft Graph openid
170
+
- Microsoft Graph User.Read
171
+
160
172
3. Under **Authentication**, **Allow public client flows** is enabled.
161
173
162
174
2. Review network configuration and validate if:
@@ -307,19 +319,18 @@ To create and run a new scan, do the following:
307
319
308
320
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** and create an App Registration in the tenant. Provide a web URL in the **Redirect URI**. [For information about the Redirect URI see this documenation from Azure Active Directory](/azure/active-directory/develop/reply-url).
309
321
310
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
322
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
311
323
312
324
2. Take note of Client ID(App ID).
313
325
314
326
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
315
327
316
-
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
328
+
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions:
317
329
318
-
- Power BI Service Tenant.Read.All
319
330
- Microsoft Graph openid
320
331
- Microsoft Graph User.Read
321
332
322
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
333
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-spn-api-permissions.png" alt-text="Screenshot of delegated permissions on Microsoft Graph.":::
323
334
324
335
1. Under **Advanced settings**, enable **Allow Public client flows**.
325
336
@@ -406,19 +417,19 @@ To create and run a new scan, do the following:
406
417
407
418
1. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**.
408
419
409
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
420
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
410
421
411
422
2. Take note of Client ID(App ID).
412
423
413
424
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
414
425
415
-
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
426
+
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. Assign the application the following delegated permissions, and grant admin consent for the tenant:
416
427
417
428
- Power BI Service Tenant.Read.All
418
429
- Microsoft Graph openid
419
430
- Microsoft Graph User.Read
420
431
421
-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
432
+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions on Power BI Service and Microsoft Graph.":::
422
433
423
434
1. Under **Advanced settings**, enable **Allow Public client flows**.
0 commit comments