Skip to main content
Version: Next

PowerBI Ingestion Guide: Setup & Prerequisites

In order to configure ingestion from PowerBI, you'll first have to ensure you have an Azure AD app with permission to access the PowerBI resources.

PowerBI Prerequisites

  1. Create an Azure AD app: Follow below steps to create an Azure AD app

    a. Login to https://portal.azure.com

    b. Go to Azure Active Directory

    c. Navigate to App registrations

    d. Click on + New registration

    e. On Register an application window fill the Name of application says powerbi-app-connector and keep other default as is

    app_registration

    f. On Register an application window click on Register

    g. The Azure portal will open up the powerbi-app-connector window as shown below. On this screen note down the Application (client) ID and click on Add a certificate or secret to generate a secret for the Application (client) ID

    powerbi_app_connector

    f. On powerbi-connector-app | Certificates & secrets window generate the client secret and note down the Secret

  2. Create an Azure AD Security Group: You need to add the Azure AD app into the security group to control resource permissions for the Azure AD app. Follow below steps to create an Azure AD Security Group.

    a. Go to Azure Active Directory

    b. Navigate to Groups and click on New group

    c. On New group window fill out the Group type,  Group name,  Group description.  Group type should be set to Security .   New group window is shown in below screenshot.

    powerbi_app_connector

    d. On New group window click on No members selected and add Azure AD app i.e. powerbi-connector-app as member

    f. On New group window click on Create to create the security group powerbi-connector-app-security-group.

  3. Assign privileges to powerbi-connector-app-security-group: You need to add the created security group into PowerBI portal to grant resource access. Follow below steps to assign privileges to your security group.

    a. Login to https://app.powerbi.com/

    b. Go to Settings -> Admin Portal

    c. On Admin Portal navigate to Tenant settings as shown in below screenshot.

    powerbi_admin_portal

    d. Enable PowerBI API: Under Tenant settings -> Developer settings -> Allow service principals to use Power BI APIs add the previously created security group i.e. powerbi-connector-app-security-group into Specific security groups (Recommended)

    e. Enable Admin API Settings: Under Tenant settings -> Admin API settings enable the following options

    • Allow service principals to use read-only admin APIs
    • Enhance admin APIs responses with detailed metadata
    • Enhance admin APIs responses with DAX and mashup expressions

    f. Add Security Group to Workspace: Navigate to Workspaces window and open workspace which you want to ingest as shown in below screenshot and click on Access and add powerbi-connector-app-security-group as member

    workspace-window-underlined

Next Steps

Once you've done all of the above steps, it's time to move on to configuring the actual ingestion source within DataHub.