Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The new Microsoft Purview experience is single, organization-wide instance of Microsoft Purview that's the next step towards unifying your organization's governance, policy, compliance, risk, and security. It's a prerequisite to a single platform used to manage and govern any data, both structured and unstructured, across your data estate. Including Azure, Microsoft 365, Azure, on-premises, or multicloud and SaaS applications in future. For organizations with multiple accounts, this upgrade process involves merging existing accounts.
When merging Microsoft Purview accounts, it's important to consider the private endpoints. Private endpoints provide a secure and private connection to the Purview governance portal and other resources, ensuring that only users within your network can access them. During the merge process, resources, configurations, and data governance policies from multiple accounts are consolidated into a single, unified account. If one or more of your classic accounts have private endpoint connections, this requires careful planning to ensure that private endpoints are correctly configured and that all necessary connections are maintained. Failure to properly manage private endpoints during the merge can result in issues and potential failure in merge process.
This article contains information to guide you resolve conflict when merging accounts with private endpoints.
Private endpoints in classic mode include the following capabilities:
- Account private endpoints: Allowed only client calls originating from within the private network to access the Microsoft Purview account.
- Portal private endpoints: Enabled secure access to the Microsoft Purview governance portal using private network connectivity.
- Ingestion private endpoints: Used to scan Azure IaaS and PaaS data sources inside Azure virtual networks and on-premises data sources through a private connection, to provide network isolation for metadata, flowing from data sources to the Microsoft Purview Data Map.
Private endpoints in unified experience include:
- Platform private endpoints: The Platform private endpoint is a new private endpoint concept in the unified portal that provides you organizational-level account private endpoint connection.
- Ingestion private endpoints: Used to scan Azure IaaS and PaaS data sources inside Azure virtual networks and on-premises data sources through a private connection.
After you upgrade your primary account into unified experience, you may need to plan for account merge for the remaining classic accounts in your tenant. It's recommended to follow these guidelines to avoid conflicts during the merge process:
- Identify classic accounts that have any private endpoints, including accounts with Managed Vnet IRs. Remove unnecessary private endpoints, Managed VNet IR's or self-hosted integration runtimes from secondary accounts.
- If an account private endpoint is identified as a conflict and blocking the merge process, it's recommended to delete all private endpoints or filter them out during the merge process. The filtered configurations will not be merged into the unified experience.
- If there's a conflict in an ingestion private endpoint, the ingestion private endpoint in the secondary account can be abandoned. It's recommended to use the ingestion private endpoint in the primary account instead. If ingestion private endpoint is needed for a different VNet, you can create more ingestion private endpoints in the primary account. Create a new self-hosted integration runtime for full VNet isolation if needed.
- Portal private endpoint should be filtered out during the merge and be deleted in the secondary account after the merge, as portal private endpoint will be deprecated.
- If you're using Managed VNet IR and self-hosted integration runtimes in both accounts, it's recommended to delete Managed VNet IR and self-hosted integration runtime in the secondary account before merge. Create new Managed VNet IR or self-hosted integration runtime in the primary account after the merge. Alternatively, filtering out Managed VNET IR and self-hosted integration runtime is recommended. Scans using these will be filtered out and will need to be recreated after the merge.
- If the plan is to use the same self-hosted integration runtime virtual machines, uninstall self-hosted integration runtime in the secondary account before merge and install self-hosted integration runtime in the primary account after merging the secondary account. It's possible to reuse the same VMs and machines or use new ones.
- Ensure Managed private endpoint connections to Platform private endpoint are properly set up in the primary account.
- Delete conflicting Managed VNet private endpoints from secondary accounts. After the merge, recreate or reuse existing Managed VNet IR in the primary account for connections to the sources that got merged.
- It's recommended to filter out Azure Data Factory and ADS lineage connections during the merge. Work with the primary account's domain source admins to reconnect it.