Connect to and manage your Microsoft Fabric tenant (2024)

  • Article

Important

Scanning a Microsoft Fabric tenant will bring in metadata and lineage from Fabric items including Power BI. The experience of registering a Fabric tenant and setting up a scan is similar to Power BI tenant and shared among all Fabric items. The scanning of Fabric items other than Power BI is currently in preview. The Supplemental Terms of Use for Microsoft Azure Previews include additional legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability.

This article outlines how to register a Microsoft Fabric tenant that's in the same tenant as your Microsoft Purview resource, and how to authenticate and interact with the Fabric source in Microsoft Purview. For more information about Microsoft Purview in general, read the introductory article.

Note

Starting from December 13th 2023, scanning Fabric tenants registered with the Fabric data source in Microsoft Purview will capture metadata and lineage from Fabric items including Power BI. The new feature will become available in all Microsoft Purview public cloud regions in the following days.

For scanning a Power BI tenant, see our Power BI documentation.

Supported capabilities

Metadata ExtractionFull ScanIncremental ScanScoped ScanClassificationLabelingAccess PolicyLineageData SharingLive view
YesYesYesNoNoNoNoYesNoYes
ExperiencesFabric itemsAvailable in scanAvailable in live view
Real-Time AnalyticsKQL DatabaseYesYes
KQL QuerysetYesYes
Data ScienceExperimentYesYes
ML modelYesYes
Data FactoryData pipelineYesYes
Dataflow Gen2YesYes
Data EngineeringLakehouseYesYes
NotebookYesYes
Spark Job DefinitionYesYes
SQL analytics endpointYesYes
Data WarehouseWarehouseYesYes
Power BIDashboardYesYes
DataflowYesYes
DatamartYesYes
Semantic model (Dataset)YesYes
ReportYesYes
Paginated reportYes

Authentication options

  • Managed Identity
  • Service Principal
  • Delegated Authentication

Known limitations

  • Currently scanning with a self-hosted integration runtime or Managed Virtual Network (VNet) integration runtime isn't supported.
  • Currently for all Fabric items besides Power BI, only item level metadata and lineage will be scanned, scanning metadata and lineage of sub level items like Lakehouse tables or files isn't supported.
  • Empty workspaces are skipped.

Prerequisites

Before you start, make sure you have the following prerequisites:

  • An Azure account with an active subscription. Create an account for free.

  • An active Microsoft Purview account.

Register Fabric tenant

This section describes how to register a Fabric tenant in Microsoft Purview for same-tenant scenario.

  1. Select the Data Map on the left navigation.

  2. Then select Register.

    Select Fabric as your data source.

    Connect to and manage your Microsoft Fabric tenant (1)

  3. Give your Fabric instance a friendly name and select a collection.

    The name must be between 3-63 characters long and must contain only letters, numbers, underscores, and hyphens. Spaces aren't allowed.

    By default, the system will find the Fabric tenant that exists in the same Microsoft Entra tenant.

Authentication to scan

To be able to scan your Microsoft Fabric tenant and review its metadata, you'll first need to create a way to authenticate with the Fabric tenant, and then give Microsoft Purview the authentication information.

Authenticate to Fabric tenant

In Microsoft Entra tenant, where Fabric tenant is located:

  1. In the Azure portal, search for Microsoft Entra ID.

  2. Create a new security group in your Microsoft Entra ID, by following Create a basic group and add members using Microsoft Entra ID.

    Tip

    You can skip this step if you already have a security group you want to use.

  3. Select Security as the Group Type.

    Connect to and manage your Microsoft Fabric tenant (2)

  4. Add any relevant users to the security group:

    • If you're using Managed Identity as authentication method, add your Microsoft Purview managed identity to this security group. Select Members, then select + Add members.

      Connect to and manage your Microsoft Fabric tenant (3)

    • If you're using delegated authentication or service principal as authentication method, add your service principal to this security group. Select Members, then select + Add members.

  5. Search for your Microsoft Purview managed identity or service principal and select it.

    Connect to and manage your Microsoft Fabric tenant (4)

    You should see a success notification showing you that it was added.

    Connect to and manage your Microsoft Fabric tenant (5)

Associate the security group with Fabric tenant

  1. Log into the Fabric admin portal.

  2. Select the Tenant settings page.

    Important

    You need to be a Fabric Admin to see the tenant settings page.

  3. Select Admin API settings > Allow service principals to use read-only admin APIs.

  4. Select Specific security groups.

  5. Select Admin API settings > Enhance admin APIs responses with detailed metadata and Enhance admin APIs responses with DAX and mashup expressions > Enable the toggle to allow Microsoft Purview Data Map automatically discover the detailed metadata of Fabric datasets as part of its scans.

    Important

    After you update the Admin API settings on your Fabric tenant, wait around 15 minutes before registering a scan and test connection.

    Caution

    When you allow the security group you created (that has your Microsoft Purview managed identity as a member) to use read-only admin APIs, you also allow it to access the metadata (e.g. dashboard and report names, owners, descriptions, etc.) for all of your Fabric artifacts in this tenant. Once the metadata has been pulled into the Microsoft Purview, Microsoft Purview's permissions, not Fabric permissions, determine who can see that metadata.

    Note

    You can remove the security group from your developer settings, but the metadata previously extracted won't be removed from the Microsoft Purview account. You can delete it separately, if you wish.

Give Microsoft Purview authentication information

  • Managed Identity
  • Service Principal
  • Delegated authentication

Managed identity

If you've followed all the steps to authenticate Microsoft Purview to Fabric, no other authentication steps are needed for Managed Identities.

Create scan

  1. In the Microsoft Purview Studio, navigate to the Data map in the left menu.

  2. Navigate to Sources.

  3. Select the registered Fabric source.

  4. Select + New scan.

  5. Give your scan a name.

  6. Select either your managed identity credential, or the credential you created for your service principal or delegated authentication.

  7. Select Test Connection before continuing to next steps. If Test Connection failed, select View Report to see the detailed status and troubleshoot the problem.

    1. Access - Failed status means the user authentication failed. Scans using managed identity will always pass because no user authentication required. If using service principal or delegated authentication, make sure your Key Vault credential was correctly set up and that Microsoft Purview has access to the key vault.
    2. Assets (+ lineage) - Failed status means the Microsoft Purview - Fabric authorization has failed. Make sure the Microsoft Purview managed identity is added to the security group associated in Fabric admin portal.
    3. Detailed metadata (Enhanced) - Failed status means the Fabric admin portal is disabled for the following setting - Enhance admin APIs responses with detailed metadata

    Tip

    For more troubleshooting, see the deployment checklist to make sure you've covered every step in your scenario.

  8. Set up a scan trigger. Your options are Recurring, and Once.

    Connect to and manage your Microsoft Fabric tenant (7)

  9. On Review new scan, select Save and run to launch your scan.

View your scans and scan runs

To view existing scans:

  1. Go to the Microsoft Purview portal. On the left pane, select Data map.
  2. Select the data source. You can view a list of existing scans on that data source under Recent scans, or you can view all scans on the Scans tab.
  3. Select the scan that has results you want to view. The pane shows you all the previous scan runs, along with the status and metrics for each scan run.
  4. Select the run ID to check the scan run details.

Manage your scans

To edit, cancel, or delete a scan:

  1. Go to the Microsoft Purview portal. On the left pane, select Data Map.

  2. Select the data source. You can view a list of existing scans on that data source under Recent scans, or you can view all scans on the Scans tab.

  3. Select the scan that you want to manage. You can then:

    • Edit the scan by selecting Edit scan.
    • Cancel an in-progress scan by selecting Cancel scan run.
    • Delete your scan by selecting Delete scan.

Note

  • Deleting your scan does not delete catalog assets created from previous scans.

Deployment checklist

  1. Make sure Fabric and Microsoft Purview accounts are in the same tenant.

  2. Make sure Fabric tenant ID is entered correctly during the registration.

  3. Make sure your Fabric Metadata model is up to date by enabling metadata scanning.

  4. From Azure portal, validate if Microsoft Purview account Network is set to public access.

  5. From Fabric tenant Admin Portal, make sure Fabric tenant is configured to allow public network.

  • Managed Identity
  • Service Principal
  • Delegated authentication

Managed identity

  1. In Microsoft Entra tenant, create a security group.

  2. From Microsoft Entra tenant, make sure Microsoft Purview account MSI is member of the new security group.

  3. On the Fabric Tenant Admin portal, validate if Allow service principals to use read-only admin APIs is enabled for the new security group.

Next steps

Now that you've registered your source, follow the below guides to learn more about Microsoft Purview and your data.

  • Data Estate Insights in Microsoft Purview
  • Search Data Catalog
Connect to and manage your Microsoft Fabric tenant (2024)

FAQs

How to enable Microsoft Fabric for tenants? ›

Enable for your tenant
  1. Navigate to the tenant settings in the admin portal and in Microsoft Fabric, expand Users can create Fabric items.
  2. Enable the Users can create Fabric items switch.
  3. (Optional) Use the Specific security groups option to enable Microsoft Fabric for specific users. ...
  4. Select Apply.
Nov 15, 2023

How do I get access to Microsoft Fabric? ›

How to start your free Fabric trial
  1. Create a Fabric free account. Set up an account to log in to the Fabric app. ...
  2. Log in to the Fabric app. Sign in to the Fabric app using your Fabric free account or Microsoft Power BI account. ...
  3. Open the account manager. ...
  4. Start using Fabric.

Why is my Fabric trial not showing up? ›

If you don't see the Start trial button in your Account manager: Your Fabric administrator might disable access, and you can't start a Fabric trial. To request access, contact your Fabric administrator. You can also start a trial using your own tenant.

What is Microsoft Fabric Link? ›

The Link to Microsoft Fabric feature built into Power Apps makes all your Dynamics 365 and Power Apps data available in Microsoft OneLake, the built-in data lake for Microsoft Fabric. No need to export data, build extract, transform, load (ETL) pipelines, or use our partner integration tools.

How do I know if my Microsoft tenant is available? ›

First one is by using the following web page: http://o365.rocks/. There you will be able to do a quick check for the availability of a tenant name in Office 365.

How do I get a Microsoft tenant? ›

To create a new tenant
  1. Sign in to the Azure portal.
  2. From the Azure portal menu, select Microsoft Entra ID.
  3. Navigate to Identity > Overview > Manage tenants.
  4. Select Create.
  5. On the Basics tab, select the type of tenant you want to create, either Microsoft Entra ID or Microsoft Entra ID (B2C).
May 16, 2024

Why is my fabric not dying? ›

Solution: Make sure the fabric you are dying is made of natural materials: Cotton, hemp, rayon, silk, jute. If your fabric is made up of synthetic materials, it will resist the dye. Polyester, lycra, microfibre, nylon won't work.

Why is my fabric conditioner not getting taken? ›

Inspect by removing the detergent drawer and locate the conditioner tube. Using some warm water and a tiny brush to clean the tube and drawer. After cleaning the dispenser drawer, fill the soap drawer with water to the top - if unblocked then the drawer will syphon the contents away.

Why is my fabric not sewing? ›

Why is my sewing machine skipping stitches? Main causes: dirty shuttle race, wrong thread tension, bad needle timing, damaged needle, using the wrong type of needle

Why do I need Microsoft Fabric? ›

With Fabric, you don't need to assemble different services from multiple vendors. Instead, it offers a seamlessly integrated, user-friendly platform that simplifies your analytics requirements. Operating on a Software as a Service (SaaS) model, Fabric brings simplicity and integration to your solutions.

How to install Microsoft Fabric? ›

In Power BI service:
  1. Select Apps.
  2. Select Get apps.
  3. Search for Microsoft Fabric.
  4. Select the Microsoft Fabric Capacity Metrics app.
  5. Select Get it now.
May 20, 2024

Is MS Fabric free? ›

Microsoft Fabric is provided free of charge when you sign up for a Microsoft Fabric trial capacity. Your use of the Microsoft Fabric trial capacity includes access to the Fabric product workloads and the resources to create and host Fabric items. The Fabric trial lasts for 60 days.

How do I enable Microsoft teams for tenants? ›

To do this, go to the Microsoft 365 admin center Settings> Settings > Microsoft Teams. If you don't see Microsoft Teams in the Services list, turn off Try the new admin center to find Settings> Services and add-ins> Microsoft Teams. This change may take up to 24 hours for all users to have access to Teams.

How do I enable Microsoft loop tenant? ›

Overview of steps

Sign into the Microsoft 365 Apps admin center and create a Cloud Policy configuration, scoped to the Microsoft 365 group mentioned above, or to the full tenant, to enable the Loop app. Wait an hour or so for the policy to propagate and log in to Loop!

How do I enable MFA in Microsoft tenant? ›

Policy configuration
  1. Sign in to the Microsoft Entra admin center as at least a Security Administrator.
  2. Select Protection > Identity Protection > MFA registration policy.
  3. Under Assignments > Users: ...
  4. Select Enforce Policy - On.
  5. Select Save.
May 13, 2024

References

Top Articles
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6266

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.