Setting Up for Power BI in Azure
To enable the use of the Control-M for Power BI plug-in, you must perform all steps in the following setup tasks in Azure:
Registering Your Application for Power BI
To connect your Power BI application with the Azure Portal, register your application with Azure Active Directory (Azure AD). Step-by-step instructions are available in the Microsoft Power BI website. For more details and information, see Register an Azure AD application to use with Power BI in the Microsoft Power BI documentation.
At the end of the registration process, you are granted a client (application) ID and a client secret.
Adding API permissions
- In the Azure Portal, select Azure Active Directory > App registrations, and then identify and select your client application.
In the following example, we choose the apiconnect application. - Select API permissions.
- On the API permissions screen, select Add a permission.
- In the Request API Permissions pane, select Power BI Service.
- Click Delegated Permissions.
- Select all delegated permissions, including all permissions in the following categories: Content, Dashboard, Dataset, Pipeline, Report, Workspace
- Click Add permissions.
- On the API permissions screen, click Grant Admin Consent for <your username>.
- Click Yes to confirm.
Disabling Multi-factor Authentication (for Username and Password Authentication)
The user that Control-M uses to connect to Power BI must not be subject to the enforcement of Multi-factor authentication (MFA) by MFA solutions such as Okta, CyberArk, or Azure MFA.
The following steps describe how to disable MFA in Azure MFA:
- In the Azure Portal, browse to Azure Active Directory > Properties for your tenant.
- Select Manage security defaults.
- Set the Enable security defaults toggle to No.
Multi-factor authentication (MFA) requirements are turned off. - Select Save.
- Ensure that MFA is disabled for your service user through the Multifactor Verification page.
Enabling Service Principal Authentication
The following steps describe how to enable service principal authentication.
- In the Power BI settings, click Admin Portal (under Governance and Insights).
In the Admin Portal, in Tenant settings, scroll down to the Developer settings section, and then expand and enable Service principals can use Fabric APIs.
- Navigate to Power BI Workspaces and, for the relevant workspace, select Workspace access.
- Click + Add people or groups.
- Type the name of the registered app, select a role (not Viewer), and then click Add.
The new app is added to the list.