Power BI Connector Setup
Applies to: Power BI Premium Per User (PPU), Power BI Premium Capacity
This guide will walk you through how to set up a Power BI connection in the Datalogz Control Tower using the service principal method for authentication. This Microsoft's recommended method for running an application in an automated way, without user input.
Setup Overview
Below is the order of operations for completing the Power BI connector setup
Create an Azure app registration
Create an Azure security group
Add the Azure app registration to the Azure security group
Add the Azure security group to the Power BI tenant
Create a Power BI connector in the Datalogz Control Tower
Setup Detail
Register an Azure app
In the Azure portal search for App registrations
Click New registration
Create a user-facing display name for your application.
Under Who can use this application or access this API? select Accounts in this organizational directory only (Single tenant)
Click Register
Note: The Application (client) ID and the Directory (tenant) ID values in the Overview screen of the registered application will be needed for the Power BI Connector setup in the Datalogz Control Tower.
Under the Manage section of your registered application, select Certificates & secrets
Under Client secret select New client secret
Enter a Description for the client secret
In the Expires leave the default set to Recommended: 180 days (6 months)
Note: You can optionally set the expiry duration to be shorter or longer. Note however that once the client secret expires you'll have to create a new secret and re-authenticate the Datalogz Control Tower Power BI connector configuration.
Click Add
Copy the Value
Note: The generated value will be our Application Secret Value used in the Datalogz Control Tower connector setup. Client secret values cannot be viewed, except for immediately after creation. Be sure to save the secret when created before leaving the page.
Create an Azure security group
In the Azure portal search for Groups
Select New group
Under Group type select Security
Note: Security groups are used to give group members access to applications, resources and assign licenses. Group members can be users, devices, service principals, and other groups.
Enter a Group name
Note: The group name will be needed to complete the Power BI tenant admin configuration.
Under Members select No members selected
Search for the name of the registered application, select the check box next to the name and then click Select
Add the Azure app registration to the Azure security group
In the Azure portal search for Groups
Select All groups
In the Search box type the name of the security group created in step 2
Select the group name
Under Manage select Members and then select Add members
Search for the name of the registered application created in step 1
Click the checkbox next to the registered application and click Select
You should now see the registered application listed under Direct members
Add the Azure security group to the Power BI tenant
From the Power BI admin portal navigate to the Tenant settings section
Under Developer settings
Find Service principals can use Fabric APIs
Select Specific security groups
Enter the Azure security group created above
Click Apply
Under Admin API settings
Find Service principals can access read-only admin APIs
Select Specific security groups
Enter the Azure security group created above
Click Apply
Find Service principals can access admin APIs used for updates
Select Specific security groups
Enter the Azure security group created above
Click Apply
Find Enhance admin APIs responses with detailed metadata
Select Specific security groups
Enter the Azure security group created above
Click Apply
Find Enhance admin APIs responses with DAX and mashup expressions
Select Specific security groups
Enter the Azure security group created above
Click Apply
Note: Power BI tenant configuration changes can take 15 minutes or longer to be applied.
Create a Power BI connector in the Datalogz Control Tower
Select Connect using a Service Principal (SP) and click Connect
Enter the following information obtained in the previous steps
Directory (Tenant) ID
Application (Client) ID
Application Secret Value
Click Connect
Enter a Connector Name
Select the snapshot frequency, e.g., Weekly or Daily
Select the kinds of workspaces you'd like to monitor, e.g., Premium, Shared, and/or Personal
Select if you'd like to capture Activity and Capacity metadata as well.
Note: For Capacity monitoring see the additional setup below
Click Next
Click Confirm and Finish
The additional capacity monitoring setup is optional, but highly recommended as it provides a way to monitor your Fabric capacity usage with the registered application created above.
Capcity Monitoring
From the Power BI admin portal navigate to the Tenant settings section
Under Integration settings
Find Semantic Model Execute Queries REST API
Select Specific security groups
Enter the Azure security group created above
Click Apply
Note: When enabled, users in the organization can query semantic models by using Data Analysis Expressions (DAX) through Power BI REST APIs.
Install the Microsoft Fabric Capacity App
Navigate to the Apps section on the side bar of Power BI.
Search for the Microsoft Fabric Capacity App and add it.
Navigate to the Microsoft Fabric Capacity Metrics workspace that is created with the app.
Go to Manage Access and grant Admin permissions to the Azure security group
Run the app for the first time to start data flowing into the semantic model.
Note: The ID of the dataset/semantic model for the Fabric Capacity Metrics will be needed to complete the setup for Capacity monitoring in the Datalogz Control Tower Power BI connector.
This can be found in the URL when viewing the semantic model in your web browser.
The full documentation for the Microsoft Fabric Capacity App can be found here.
For questions or assistance with this setup, please contact Datalogz support support@datalogz.io
Last updated