PowerBI Ingestion Guide: Setup & Prerequisites
In order to configure ingestion from PowerBI, you'll first have to ensure you have an Azure AD app with permission to access the PowerBI resources.
PowerBI Prerequisites
Create an Azure AD app: Follow below steps to create an Azure AD app
a. Login to https://portal.azure.com
b. Go to
Azure Active Directory
c. Navigate to
App registrations
d. Click on
+ New registration
e. On
Register an application
window fill theName
of application sayspowerbi-app-connector
and keep other default as isf. On
Register an application
window click onRegister
g. The Azure portal will open up the
powerbi-app-connector
window as shown below. On this screen note down theApplication (client) ID
and click onAdd a certificate or secret
to generate a secret for theApplication (client) ID
f. On
powerbi-connector-app | Certificates & secrets
window generate the client secret and note down theSecret
Create an Azure AD Security Group: You need to add the
Azure AD app
into the security group to control resource permissions for theAzure AD app
. Follow below steps to create an Azure AD Security Group.a. Go to
Azure Active Directory
b. Navigate to
Groups
and click onNew group
c. On
New group
window fill out theGroup type
,Group name
,Group description
.Group type
should be set toSecurity
.New group
window is shown in below screenshot.d. On
New group
window click onNo members selected
and addAzure AD app
i.e. powerbi-connector-app as memberf. On
New group
window click onCreate
to create the security grouppowerbi-connector-app-security-group
.Assign privileges to powerbi-connector-app-security-group: You need to add the created security group into PowerBI portal to grant resource access. Follow below steps to assign privileges to your security group.
a. Login to https://app.powerbi.com/
b. Go to
Settings
->Admin Portal
c. On
Admin Portal
navigate toTenant settings
as shown in below screenshot.d. Enable PowerBI API: Under
Tenant settings
->Developer settings
->Allow service principals to use Power BI APIs
add the previously created security group i.e. powerbi-connector-app-security-group intoSpecific security groups (Recommended)
e. Enable Admin API Settings: Under
Tenant settings
->Admin API settings
enable the following optionsAllow service principals to use read-only admin APIs
Enhance admin APIs responses with detailed metadata
Enhance admin APIs responses with DAX and mashup expressions
f. Add Security Group to Workspace: Navigate to
Workspaces
window and open workspace which you want to ingest as shown in below screenshot and click onAccess
and addpowerbi-connector-app-security-group
as member
Next Steps
Once you've done all of the above steps, it's time to move on to configuring the actual ingestion source within DataHub.
Need more help? Join the conversation in Slack!