Skip to main content
All CollectionsConnector Setup
How to set up Power BI
How to set up Power BI
Updated over a week ago

Use this connector to have Foundational scan and determine lineage and downstream impact for Power BI.

This setup should take about 15 minutes.

Permissions: You need to be an Azure admin for some parts of this setup.

Configuring Power BI Connector

In order to provide Foundational access to Power BI, please follow the steps below:

1. Create Azure Application

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Select Microsoft Entra ID

  3. Select App registrations

  4. Select New registration

  5. In the new window, enter a name for the application, e.g., powerbi-foundational-connector . Keep the other options with the default selection, and click Register to complete

  6. The Azure portal will now open the powerbi-app-connector window. Write down the value of Application (client) ID and the value of Directory (tenant) ID. You will need both of these values later in the Foundational connector configuration screen

  7. Select Add a certificate or secret to generate a secret for the application

  8. Click on New client secret

  9. Fill in the description and set an expiration date

  10. Write down the Secret ID and Value

2. Create a new Azure Active Directory security group

  1. Go to Microsoft Entra ID

  2. Select Groups

  3. Click on New group

  4. Set Group Type to Security, and provide a group name, e.g., power-bi-foundational-connector-security-group

  5. Now, add a member to the group by clicking on No members selected

  6. Add the power-bi-foundational-connector application that we created in the previous step as a member of this group

3. Assign Permissions to the Security Group

  1. Click the gear icon to open Settings, and then select Admin portal

  2. In Admin portal, select Tenant settings

  3. In Tenant settings, go to the Admin API settings section:

    1. Enable Service principals can access read-only admin APIs, and add power-bi-foundational-connector-security-group to the Specific security groups

    2. Enable also these two options:

      1. Enhance admin APIs responses with detailed metadata

      2. Enhance admin APIs responses with DAX and mashup expressions
        (you need the DAX configuration, as some of the PowerBI queries might be using DAX and mashup expressions for reading data)

  4. In Tenant settings, select Developer settings

    1. Enable the Service prinicipals can use Fabric APIs option

    2. Add power-bi-foundational-connector-security-group to the Specific security groups

4. Add the Security Group to Relevant Workspaces

  1. Go to the workspace you want Foundational to access

  2. Select Manage Access

  3. Add power-bi-foundational-connector-security-group to the list of users with access, with a Viewer role

Did this answer your question?