Skip to content

Commit ec21d0b

Browse files
Merge pull request #215595 from zeinab-mk/patch-27
Update register-scan-power-bi-tenant.md
2 parents d2b5767 + 3e353c1 commit ec21d0b

File tree

4 files changed

+61
-31
lines changed

4 files changed

+61
-31
lines changed
128 KB
Loading
59.4 KB
Loading

articles/purview/register-scan-power-bi-tenant-cross-tenant.md

Lines changed: 34 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 09/22/2022
9+
ms.date: 10/24/2022
1010
ms.custom: template-how-to, ignite-fall-2021
1111
---
1212

@@ -78,10 +78,16 @@ Use either of the following deployment checklists during the setup, or for troub
7878

7979
1. In the Power BI Azure AD tenant, validate the following app registration settings:
8080
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
81-
2. Under **API permissions**, the following APIs are set up with **read** for **delegated permissions** and **grant admin consent for the tenant**:
82-
1. Power BI Service Tenant.Read.All
83-
2. Microsoft Graph openid
84-
3. Microsoft Graph User.Read
81+
82+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
83+
- Microsoft Graph openid
84+
- Microsoft Graph User.Read
85+
86+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
87+
- Power BI Service Tenant.Read.All
88+
- Microsoft Graph openid
89+
- Microsoft Graph User.Read
90+
8591
3. Under **Authentication**:
8692
1. **Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
8793
2. **Implicit grant and hybrid flows** > **ID tokens (used for implicit and hybrid flows)** is selected.
@@ -115,10 +121,16 @@ Use either of the following deployment checklists during the setup, or for troub
115121

116122
1. In the Power BI Azure AD tenant, validate the following app registration settings:
117123
1. The app registration exists in your Azure AD tenant where the Power BI tenant is located.
118-
2. Under **API permissions**, the following APIs are set up with **read** for **delegated permissions** and **grant admin consent for the tenant**:
119-
1. Power BI Service Tenant.Read.All
120-
2. Microsoft Graph openid
121-
3. Microsoft Graph User.Read
124+
125+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
126+
- Microsoft Graph openid
127+
- Microsoft Graph User.Read
128+
129+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
130+
- Power BI Service Tenant.Read.All
131+
- Microsoft Graph openid
132+
- Microsoft Graph User.Read
133+
122134
3. Under **Authentication**:
123135
1. **Supported account types** > **Accounts in any organizational directory (Any Azure AD directory - Multitenant)** is selected.
124136
2. **Implicit grant and hybrid flows** > **ID tokens (used for implicit and hybrid flows)** is selected.
@@ -236,7 +248,11 @@ To create and run a new scan by using the Azure runtime, perform the following s
236248

237249
1. If your key vault isn't connected to Microsoft Purview yet, you need to [create a new key vault connection](manage-credentials.md#create-azure-key-vaults-connections-in-your-microsoft-purview-account).
238250

239-
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of the client ID (app ID).
251+
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
252+
253+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
254+
255+
3. Take note of the client ID (app ID).
240256

241257
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot that shows how to create a service principle.":::
242258

@@ -246,7 +262,7 @@ To create and run a new scan by using the Azure runtime, perform the following s
246262
- Microsoft Graph openid
247263
- Microsoft Graph User.Read
248264

249-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI and Microsoft Graph.":::
265+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions on Power BI and Microsoft Graph.":::
250266

251267
1. From the Azure AD dashboard, select the newly created application, and then select **Authentication**. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
252268

@@ -309,17 +325,20 @@ To create and run a new scan by using the Azure runtime, perform the following s
309325

310326
To create and run a new scan by using the self-hosted integration runtime, perform the following steps:
311327

312-
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**. Take note of the client ID (app ID).
328+
1. Create an app registration in your Azure AD tenant where Power BI is located. Provide a web URL in the **Redirect URI**.
329+
330+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-cross-tenant-app-registration.png" alt-text="Screenshot how to create App in Azure AD for cross tenant.":::
331+
332+
2. Take note of the client ID (app ID).
313333

314334
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot that shows how to create a service principle.":::
315335

316-
1. From the Azure AD dashboard, select the newly created application, and then select **App permissions**. Assign the application the following delegated permissions, and grant admin consent for the tenant:
336+
1. From the Azure AD dashboard, select the newly created application, and then select **App permissions**. Assign the application the following delegated permissions:
317337

318-
- Power BI Service Tenant.Read.All
319338
- Microsoft Graph openid
320339
- Microsoft Graph User.Read
321340

322-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI and Microsoft Graph.":::
341+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-spn-api-permissions.png" alt-text="Screenshot of delegated permissions on Microsoft Graph.":::
323342

324343
1. From the Azure AD dashboard, select the newly created application, and then select **Authentication**. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
325344

articles/purview/register-scan-power-bi-tenant.md

Lines changed: 27 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: csugunan
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 10/19/2022
9+
ms.date: 10/24/2022
1010
ms.custom: template-how-to, ignite-fall-2021
1111
---
1212

@@ -100,10 +100,16 @@ Use any of the following deployment checklists during the setup or for troublesh
100100

101101
1. Validate App registration settings to make sure:
102102
1. App registration exists in your Azure Active Directory tenant.
103-
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
104-
1. Power BI Service Tenant.Read.All
105-
2. Microsoft Graph openid
106-
3. Microsoft Graph User.Read
103+
104+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
105+
- Microsoft Graph openid
106+
- Microsoft Graph User.Read
107+
108+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
109+
- Power BI Service Tenant.Read.All
110+
- Microsoft Graph openid
111+
- Microsoft Graph User.Read
112+
107113
3. Under **Authentication**, **Allow public client flows** is enabled.
108114

109115
2. If delegated authentication is used, validate Power BI admin user settings to make sure:
@@ -153,10 +159,16 @@ Use any of the following deployment checklists during the setup or for troublesh
153159

154160
1. Validate App registration settings to make sure:
155161
1. App registration exists in your Azure Active Directory tenant.
156-
2. Under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
157-
1. Power BI Service Tenant.Read.All
158-
2. Microsoft Graph openid
159-
3. Microsoft Graph User.Read
162+
163+
2. If service principal is used, under **API permissions**, the following **delegated permissions** are assigned with read for the following APIs:
164+
- Microsoft Graph openid
165+
- Microsoft Graph User.Read
166+
167+
3. If delegated authentication is used, under **API permissions**, the following **delegated permissions** and **grant admin consent for the tenant** is set up with read for the following APIs:
168+
- Power BI Service Tenant.Read.All
169+
- Microsoft Graph openid
170+
- Microsoft Graph User.Read
171+
160172
3. Under **Authentication**, **Allow public client flows** is enabled.
161173

162174
2. Review network configuration and validate if:
@@ -307,19 +319,18 @@ To create and run a new scan, do the following:
307319

308320
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** and create an App Registration in the tenant. Provide a web URL in the **Redirect URI**. [For information about the Redirect URI see this documenation from Azure Active Directory](/azure/active-directory/develop/reply-url).
309321

310-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
322+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
311323

312324
2. Take note of Client ID(App ID).
313325

314326
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
315327

316-
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
328+
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions:
317329

318-
- Power BI Service Tenant.Read.All
319330
- Microsoft Graph openid
320331
- Microsoft Graph User.Read
321332

322-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
333+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-spn-api-permissions.png" alt-text="Screenshot of delegated permissions on Microsoft Graph.":::
323334

324335
1. Under **Advanced settings**, enable **Allow Public client flows**.
325336

@@ -406,19 +417,19 @@ To create and run a new scan, do the following:
406417

407418
1. Create an App Registration in your Azure Active Directory tenant. Provide a web URL in the **Redirect URI**.
408419

409-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in AAD.":::
420+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-scan-app-registration.png" alt-text="Screenshot how to create App in Azure AD.":::
410421

411422
2. Take note of Client ID(App ID).
412423

413424
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-create-service-principle.png" alt-text="Screenshot how to create a Service principle.":::
414425

415-
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. From **API Permissions**, assign the application the following delegated permissions and grant admin consent for the tenant:
426+
1. From Azure Active Directory dashboard, select newly created application and then select **App registration**. Assign the application the following delegated permissions, and grant admin consent for the tenant:
416427

417428
- Power BI Service Tenant.Read.All
418429
- Microsoft Graph openid
419430
- Microsoft Graph User.Read
420431

421-
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions for Power BI Service and Microsoft Graph.":::
432+
:::image type="content" source="media/setup-power-bi-scan-catalog-portal/power-bi-delegated-permissions.png" alt-text="Screenshot of delegated permissions on Power BI Service and Microsoft Graph.":::
422433

423434
1. Under **Advanced settings**, enable **Allow Public client flows**.
424435

0 commit comments

Comments
 (0)