Hello @Amit Singh,
Welcome to the MS Q&A platform.
Microsoft purview doesn't currently provide logs for IR registration, deregistered events or authentication key regeneration events. But you can monitor these events via Azure portal monitor activity logs.
Regarding expiry data for the authentication key, the authentication key used to register a self-hosted IR with Microsoft Purview does not have an expiry date, but it is recommended to regenerate the key periodically for security reasons.
The encryption keys generally use Advanced Encryption Standard, 128 and 256-bit encryptions. But I don't see any documentation for this.
To configure a self-hosted integration runtime to retrieve credentials from Azure Key Vault, you can follow these steps:
- Create an Azure Key Vault and store the required credentials in it.
- Grant the necessary permissions to the self-hosted integration runtime to access the Azure Key Vault.
- Configure the self-hosted integration runtime to retrieve the required credentials from the Azure Key Vault.
When using Option 2 to store credentials locally, the credentials are encrypted using the DPAPI (Data Protection API) encryption mechanism provided by Windows. This encryption is used for data source credentials and the authentication key to register the self-hosted integration runtime with Microsoft Purview.
I hope this helps. Please let me know if you have any further questions.