Microsoft Purview is a unified data governance and compliance platform that provides APIs for managing data assets across hybrid and multi-cloud environments. Purview supports automated data discovery, classification, and lineage tracking to maintain a centralized metadata catalog, and it integrates with compliance and security services to enforce policies such as data classification, access control, and Data Loss Prevention (DLP).
More information can be found at Microsoft Purview Website page.
Integration Method: API Ingest
Tables: Entity Management (3004), Scan Activity (6007), Cloud Resource Inventory info (5023)
This integration supports the following events.
Event | Description |
|---|---|
Retrieves the execution details of data source scans, including status, timestamps, and outcomes of each scan run. | |
Policies | Captures the creation, update, or deletion of governance and compliance policies. |
This feed must be initially onboarded to the staging environment prior to production. Contact your support team for questions
Prerequisites
The user should have access to the Azure portal with an account that has the Global Administrator privileges
The user should have access to the DataBee console
Configuration Overview
Create an application with the required roles to fetch the data.
Create Microsoft Purview Feed in the DataBee console with the required Client credentials.
DataBee Parameter
Azure Parameter
Client Key
Client Secret
Token URL(<tenant_id>)
Azure Configuration
Create an application
Log on to Azure portal with an account that has the Global Administrator privileges.  
In the search bar, search for App registrations and select it.
On the App registrations page, select New registration, the Register an application window will appear.
On the Register an application window:
Under Name, enter your Application Name then click on Register to create the application.
On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
 
Create the Client Secret
The final step in accessing the APIs is creating a Client Secret. To create it from the Azure Portal:
Select the application created above.
Under Manage, click Certificates & secrets, and then Client secrets. 
Click New client secret. Then Add a client secret window appears. 
On Add a client secret window:
Enter a Description for this client secret and select the desired expiry period from the Expires drop-list.
Then click on Add to create the client secret.

Note:
The user needs to re-create the client secret when it expires.
Add Roles
Once the application is created in the Microsoft Azure Portal, it must be granted the appropriate roles in Microsoft Purview to access and retrieve data from endpoint. Assigning roles to the application’s service principal ensures it has the necessary roles to interact with Purview endpoints. The following section outlines how to configure and assign the required roles within Purview.
Granting Roles
Log in into your Microsoft Purview Portal:
Navigate to Settings → Account and copy the Resource Name. This value should be used as the domain in the Microsoft Purview endpoint.

Select the data map icon on left.
Then navigate to Collection. Click on Role assignments.
Select Collection admins and Data source admins roles from the drop down. Both roles are assigned to provide full access to collection data and scan/data source operations in Microsoft Purview.
Search the application name created on previous step in the dialogue box on left, then click Ok.

DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.

Search for the Microsoft Purview and click it as shown below.

Click on the API Ingest option for collection method.

This feed is currently in BETA. Set the environment to Staging. Contact DataBee support for more information.

In the configuration section, enter the following:
Authorization Method: OAuth2
API Base URL: Replace the <domain> with the domain name in purview portal.
Client Key: Paste the Client ID generated earlier in the Azure portal.
Client Secret: Paste the Client Secret value generated earlier in the Azure portal.
Token URL: Replace <tenant_id> with your Directory (Tenant) ID.
Event Types: Preselected for all the event types that integration pulls.

Click on Test Connection, once the connection is successful, as shown below. Click Submit.

Troubleshooting Tips
If you are facing an invalid client or unauthorized client error, this might be possibly due to incorrect credentials. Ensure the client key, client secret and Tenant ID are pasted correctly. Since you cannot view the client secret after the 1st time, re-create it, paste it on a text editor to ensure no spaces or unexpected characters are included and reconfigure the DataBee feed.
If you are facing a 403-response code, this might be possibly due to missing roles. Ensure that all the required roles are assigned correctly as per the above-mentioned steps.

