0% found this document useful (0 votes)
9 views

Creating app in Azure and enabling API access for PowerBI

The document outlines the steps to create a Microsoft Entra app in the Azure Portal and integrate Power BI services for authentication and API access. Key steps include app registration, generating client secrets, setting API permissions, and enabling Power BI service admin settings. Additionally, it covers adding a service principal or security group for access management in Power BI workspaces.

Uploaded by

anupam
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Creating app in Azure and enabling API access for PowerBI

The document outlines the steps to create a Microsoft Entra app in the Azure Portal and integrate Power BI services for authentication and API access. Key steps include app registration, generating client secrets, setting API permissions, and enabling Power BI service admin settings. Additionally, it covers adding a service principal or security group for access management in Power BI workspaces.

Uploaded by

anupam
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Objective : To create an Microsoft Entra app in Azure Portal and add PowerBi services in it, in order

to get required endpoints for Microsoft login and a token for authentication for calling the official
PowerBI rest API.

(Official documentation)

Step 1 : Sign in to Azure portal and search for app registration and click on it.

Step 2 : In app registration click on New registration.


Step 3 : Once inside app registration fill the required details and register :

 Application Name
 Supported account type
 Redirect URI (optional could be setup later) and a platform for it.

Note - URI in Node app as of now is :


http://v3powbi.corp.v3it.com/api/login/auth/microsoft/callback

Step 4: Upon successful registration the application page will open and from there Application
(client) ID and Directory (tenant) ID would be required in the node app for setting up login. Next ,
click on Certificates & secrets.
Step 5: Inside Certificates & secrets click on New client secrets inside it select a description and
expiration period of client secrets and click on add.

(Optional: Official Documentation for adding certificates)

Step 6: Upon the token generation copy its value and save it in a secure location( Value is one time
view only so make sure to store it somewhere). This secret will also be required in the node app.
Step 7: Migrate to API permission and add required PowerBI service.

(In API permission Admin consent might be required for calling API not sure as of now, in API
permission )

Step 8: Create a Microsoft Entra Security group.

Note : If you want to enable service principal access for the entire organization, skip this step.

Official documentation for creating Security group.

Step 9: Enable the Power BI service admin settings

In PowerBi admin portal , go to Tenant settings, and scroll down to Developer settings.

 Enable Embed content in apps either for the entire organization or for the specific security
group you created in Microsoft Entra ID.
 Enable Allow service principals to use Power BI APIs either for the entire organization or for
the specific security group you created in Microsoft Entra ID.
Step 10: Add a service principal or security group manually

 In the Power BI service, scroll to the workspace you want to enable access for. From its More
menu, select Workspace access.

 In the Access pane, under Add admins, members, or contributors, add one of the following:
o Your service principal. The name of your service principal is the Display name of your
Microsoft Entra app, as it appears in your Microsoft Entra app's overview tab.
o The security group that includes your service principal.
 On the dropdown menu, select Member or Admin, and select Add

You might also like