PowerBI Ingestion Guide: Setup & Prerequisites
In order to configure ingestion from PowerBI, you'll first have to ensure you have an Azure AD app with permission to access the PowerBI resources.
PowerBI Prerequisites
Create an Azure AD app: Follow below steps to create an Azure AD app
a. Login to https://portal.azure.com
b. Go to
Azure Active Directory
c. Navigate to
App registrations
d. Click on
+ New registration
e. On
Register an application
window fill theName
of application sayspowerbi-app-connector
and keep other default as isf. On
Register an application
window click onRegister
g. The Azure portal will open up the
powerbi-app-connector
window as shown below. On this screen note down theApplication (client) ID
and click onAdd a certificate or secret
to generate a secret for theApplication (client) ID
f. On
powerbi-connector-app | Certificates & secrets
window generate the client secret and note down theSecret
You need to configure
Application (client) ID
andSecret
in powerbi connector recipe.Create an Azure AD Security Group: You need to add the
Azure AD app
into the security group to control resource permissions for theAzure AD app
. Follow below steps to create an Azure AD Security Group.a. Go to
Azure Active Directory
b. Navigate to
Groups
and click onNew group
c. On
New group
window fill out theGroup type
,Group name
,Group description
.Group type
should be set toSecurity
.New group
window is shown in below screenshot.d. On
New group
window click onNo members selected
and addAzure AD app
i.e. powerbi-connector-app as memberf. On
New group
window click onCreate
to create the security grouppowerbi-connector-app-security-group
.Assign privileges to powerbi-connector-app-security-group: You need to add the created security group into PowerBI portal to allow resource access. Follow below steps to allow
powerbi-connector-app-security-group
to access PowerBI resources.a. Login to https://app.powerbi.com/
b. Go to
Settings
->Admin Portal
c. On
Admin Portal
navigate toTenant settings
as shown in below screenshot.d. Enable PowerBI API: Under
Tenant settings
->Developer settings
->Allow service principals to use Power BI APIs
add the previously created security group i.e. powerbi-connector-app-security-group intoSpecific security groups (Recommended)
e. Enable Admin MetaData: Under
Tenant settings
->Admin API settings
enable below options- Allow service principals to use read-only admin APIs
- Enhance admin APIs responses with detailed metadata
- Enhance admin APIs responses with DAX and mashup expressions
f. Add Security Group to Workspace: Navigate to
Workspaces
window and open workspace which you want to ingest as shown in below screenshot and click onAccess
and addpowerbi-connector-app-security-group
as member
Next Steps
Once you've done all of the above steps, it's time to move on to configuring the actual ingestion source within DataHub.
Need more help? Join the conversation in Slack!