英文:
Atlas endpoint "Resource not found" via Purview API
问题
根据您提供的内容,以下是翻译好的部分:
根据此指南https://learn.microsoft.com/en-us/azure/purview/tutorial-atlas-2-2-apis,我尝试发送任何请求到我的Purview帐户的Atlas端点(即POST {{endpoint}}/api/atlas/v2/types/typedefs),甚至只是直接访问端点,但我得到的唯一响应是:{"error":{"code":"ResourceNotFound","message":"未找到资源"}}。
我认为这可能是权限问题,但我对订阅、资源组、Purview帐户以及Purview目录中的所有角色(Collection admins、Data source admins、Data curators、Data readers、Insights readers、Policy authors、Workflow admins)都具有管理员访问权限。
有人能建议可能配置错误的地方,不允许我访问Atlas端点吗?
英文:
Following this guide https://learn.microsoft.com/en-us/azure/purview/tutorial-atlas-2-2-apis I am trying to send any request to the atlas endpoint of my purview account (i.e. POST {{endpoint}}/api/atlas/v2/types/typedefs) or even just accessing the endpoint directly but the only response I get is: {"error":{"code":"ResourceNotFound","message":"Resource not found"}}.
I presume it is a problem with permissions but I have admin access to the subscription, resource group, purview account as well as all of the roles in the purview catalog (Collection admins_,_ Data source admins_,_ Data curators_,_ Data readers_,_ Insights readers_,_ Policy authors_,_ Workflow admins).
Can anyone suggest what could be configured incorrectly to not allow me to access the atlas endpoint?
答案1
得分: 0
我已经通过参考此GitHub链接在我的环境中复现了此问题,并获得了预期的结果。
我已经按照以下步骤进行了操作-
- 我已在Azure AD中完成了应用程序注册,并创建了密钥以生成令牌。还授予了以下权限。请参考SO问题 由@Vincent Diallo-Nort提供的信息,了解如何授予权限。
- 转到根集合,如下所示
在集合中为您在Azure AD中注册的应用程序提供权限,就像我在下面的示例中所做的那样。您可以授予所有角色权限。
- 在Postman中使用
https://login.microsoft.com/<your tenant_id>/oauth2/token
生成令牌
- 使用Bearer令牌请求URL
https://afreen.purview.azure.com/catalog/api/atlas/v2/types/typedefs
并获得结果。
英文:
I have reproduced the issue at my environment by referring this github link and got the expected result
I have followed the below steps-
- I have done an app registration in Azure AD and created secrets too, to generate token. Grant the below permission as well. Refer SO question by @Vincent Diallo-Nort to know about how to grant permission.
- Go to root collection as shown below
Provide permission to the app which you have registered in Azure AD as I have done below in collections. You can give permission to all the roles.
- Generate token in postman using
https://login.microsoft.com/<your tenant_id>/oauth2/token
- Used the Bearer token to request URL
https://afreen.purview.azure.com/catalog/api/atlas/v2/types/typedefs
and got the result.
通过集体智慧和协作来改善编程学习和解决问题的方式。致力于成为全球开发者共同参与的知识库,让每个人都能够通过互相帮助和分享经验来进步。
评论