Set up a connector to manage ChatGPT Enterprise AI interactions in Microsoft Purview

This article outlines how to register ChatGPT Enterprise workspaces as a data source in Microsoft Purview. This connector allows you to discover and govern interactions with ChatGPT Enterprise AI across your organization.

Supported capabilities

Choose to scan all user interactions from the current date or pick a specific start date from past when configuring your scan.

Metadata Extraction Full Scan Incremental Scan Scoped Scan Classification Labeling Access Policy Lineage Data Sharing Live view
Yes Yes Yes No Yes No No No No No

When scanning ChatGPT Enterprise sources, Microsoft Purview supports:

  • Extracting technical metadata including:
  • Text prompts
  • Text responses

Prerequisites

  • An Azure account with an active subscription.
  • An active Enterprise Microsoft Purview account
    • If you create a classic Microsoft Purview instance for the first time in your organization, the instance is automatically upgraded to the enterprise version of Microsoft Purview.
  • Data Source Administrator and Data Reader permissions must be assigned to register a source and manage it in the Microsoft Purview governance portal.
  • A Microsoft 365 Copilot license (recommended)
  • A ChatGPT Enterprise plan

Required permissions for scan

Your organization must have permissions for the Purview API used by the third party connector. Complete the following steps to assign the Purview API permissions using Microsoft Graph PowerShell:

  1. Get the object ID for your organization from the Azure portal, search for Microsoft Purview in the search bar, and select Microsoft Purview accounts from the search results.

  2. Select your Purview account and copy the account/subscription name.

  3. In the search bar, search for Enterprise and select Enterprise applications in the results.

  4. Select All applications in the left navigation pane. Enter your account name/subscription name in the search field.

  5. Select on the search result Overview to get the Object ID.

  6. Assign Purview API roles to your managed identity application by connecting to MS Graph. In portal.azure.com, open PowerShell and run Connect-MgGraph and authenticate and sign-in to your account

  7. Run the following cmdle to get the ServicePrincipal ID for your organization for the Purview API app.

    Get-MgServicePrincipal -Filter "AppId eq '9ec59623-ce40-4dc8-a35-ed0275b5d58a' '').Id
    
  8. Assign the following app-only permissions to the Purview app:

    • PrincipalID = ObjectID retrieved in Step 5.
    • ResourceID = Service Principal ID from in Step 7.
    • AppRoleID = Purview API AppID from in Step 7.
    $bodyParam= @{
    "PrincipalId"= "{ObjectID}"
    "ResourceId" = "{ResourceId}"
    "AppRoleId" = "{RoleID}"
    }
    New-MgServicePrincipalAppRoleAssignment -ServicePrincipalId '{ObjectId}' -BodyPatameter$bodyParam
    

You must also add the necessary permission for other Purview solutions used as a part of this scanning:

Microsoft Purview uses the OAuth 2.0 protocol for accessing ChatGPT Enterprise workspaces. Set up the credential by following the instruction in the Scan section later in this article.

Register

This section describes how to register a ChatGPT Enterprise workspace in Microsoft Purview using the Microsoft Purview governance portal.

Complete the following steps to register:

  1. Open the Azure portal and complete the following steps:

    1. Search for Key Vault to create/manage the secret to use for this connector.
    2. Create a Key Vault.
    3. Grant role assignments to your Key Vault. Assign Key Vault administrators and Key Vault secret users for the required members. For other roles, check the Key Vault roles in the Required permissions section.
    4. Create a secret for your Key Vault.
    5. For your Key Vault, assign access policy.
  2. Open the Microsoft Purview governance portal and complete the following steps:

    1. Search for Microsoft Purview accounts, select the account you want to use and select Open Microsoft Purview governance portal.
    2. Select Data map in left navigation and select the Data source.
    3. Select Register data source.
    4. On register sources, select ChatGPT Enterprise and select Continue.
  3. Open the ChatGPT Enterprise register source and complete the following steps:

    1. Enter a name for the data source within the catalog.
    2. Enter the WorkspaceID for your Enterprise workspace.
    3. Select a domain and collection.
    4. Select Register.
  4. Open the Microsoft Purview portal and complete the following steps:

    1. Select Source management under Data map, and select Credentials.
    2. Select New.
    3. Create and manage credentials for scans in Microsoft Purview Data Map
    4. Enter the name, description, and select the domain.
    5. For authentication method, select API key.
    6. For Key Vault connection, select the Azure key vault created for ChatGPT Enterprise.
    7. Enter the secret name and secret version.

Scan

Complete the following steps to scan a ChatGPT Enterprise workspace to automatically identify messages. For more information about scanning in general, see our introduction to scans and ingestion.

  1. Navigate to Sources.
  2. Select the registered ChatGPT Enterprise workspace.
  3. Select New scan and complete the following:
    1. Name: The name of the scan.
    2. Capture data since: Select if the scan should capture data from the current date of the new scan or choose a specific date from the past.
    3. Credential: Select the credential mapping to the correct Key Vault for this connector.
    4. Domain: Select a domain from the existing list or choose default domain.
    5. Collection: Select a collection from your domain.
  4. Select Test connection to ensure the connection is established successfully. Select Continue.
  5. Review your scan and select Save and Run.

For future scans, we recommend running an incremental scan. Avoid creating a new scan to avoid duplicate ingestion of data.

View scans

To view existing scans, complete the following steps:

  1. Open the Microsoft Purview portal and select Data map.
  2. Select the data source. You can view a list of existing scans on that data source under Recent scans, or you can view all scans on the Scans tab.
  3. Select the scan that has results you want to view. The pane shows you all the previous scans, along with the status and metrics for each scan.
  4. Select the scan ID to check the scan details. During scanning, the organization is considered an asset, but isn't classified. The number of assets classified in the scan details are always one less than the number of assets ingested.
  5. Review added data to Microsoft Purview in Data Security Posture Management (DSPM) for AI.
    1. View analytics for AI interactions, sensitive data, and insider risk in DSPM for AI reports.
    2. View the AI interactions for prompts and responses in Activity explorer.
    3. View the sensitive info type data identified in prompts and responses in Activity explorer. \

Use other Microsoft Purview solutions with this data: