Skip to content

Commit

Permalink
fix: Fix broken links on PowerBI (datahub-project#7959)
Browse files Browse the repository at this point in the history
Co-authored-by: socar-dini <[email protected]>
  • Loading branch information
yoonhyejin and socar-dini committed May 4, 2023
1 parent ca5dffa commit 35dde47
Showing 1 changed file with 18 additions and 19 deletions.
37 changes: 18 additions & 19 deletions docs/quick-ingestion-guides/powerbi/setup.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
---
title: Setup
---

# PowerBI Ingestion Guide: Setup & Prerequisites

In order to configure ingestion from PowerBI, you'll first have to ensure you have an Azure AD app with permission to access the PowerBI resources.
Expand All @@ -10,7 +11,7 @@ In order to configure ingestion from PowerBI, you'll first have to ensure you ha
1. **Create an Azure AD app:** Follow below steps to create an Azure AD app

a. Login to https://portal.azure.com

b. Go to `Azure Active Directory`

c. Navigate to `App registrations`
Expand All @@ -20,18 +21,18 @@ In order to configure ingestion from PowerBI, you'll first have to ensure you ha
e. On `Register an application` window fill the `Name` of application says `powerbi-app-connector` and keep other default as is

<p align="center">
<img width="75%" alt="app_registration" src="https:https://raw.githubusercontent.com/main/static-assets/main/imgs/guides/powerbi/app-registration.png"/>
<img width="75%" alt="app_registration" src="http:https://raw.githubusercontent.com/datahub-project/static-assets/main/imgs/guides/powerbi/app-registration.png"/>
</p>

f. On `Register an application` window click on `Register`

g. The Azure portal will open up the `powerbi-app-connector` window as shown below. On this screen note down the `Application (client) ID` and click on `Add a certificate or secret` to generate a secret for the `Application (client) ID`

<p align="center">
<img width="75%" alt="powerbi_app_connector" src="https://raw.githubusercontent.com/main/static-assets/main/imgs/guides/powerbi/powerbi-connector-window.png"/>
<img width="75%" alt="powerbi_app_connector" src="https://raw.githubusercontent.com/datahub-project/static-assets/main/imgs/guides/powerbi/powerbi-connector-window.png"/>
</p>

f. On `powerbi-connector-app | Certificates & secrets` window generate the client secret and note down the `Secret`
f. On `powerbi-connector-app | Certificates & secrets` window generate the client secret and note down the `Secret`

2. **Create an Azure AD Security Group:** You need to add the `Azure AD app` into the security group to control resource permissions for the `Azure AD app`. Follow below steps to create an Azure AD Security Group.

Expand All @@ -42,43 +43,41 @@ In order to configure ingestion from PowerBI, you'll first have to ensure you ha
c. On `New group` window fill out the `Group type`,&nbsp; `Group name`, &nbsp;`Group description`. &nbsp;`Group type` should be set to `Security` . &nbsp; `New group` window is shown in below screenshot.

<p align="center">
<img width="75%" alt="powerbi_app_connector" src="https://raw.githubusercontent.com/main/static-assets/main/imgs/guides/powerbi/new-group-window.png"/>
<img width="75%" alt="powerbi_app_connector" src="https://raw.githubusercontent.com/datahub-project/static-assets/main/imgs/guides/powerbi/new-group-window.png"/>
</p>

d. On `New group` window click on `No members selected` and add `Azure AD app` i.e. *powerbi-connector-app* as member
d. On `New group` window click on `No members selected` and add `Azure AD app` i.e. _powerbi-connector-app_ as member

f. On `New group` window click on `Create` to create the security group `powerbi-connector-app-security-group`.

3. **Assign privileges to powerbi-connector-app-security-group:** You need to add the created security group into PowerBI portal to grant resource access. Follow below steps to assign privileges to your security group.
3. **Assign privileges to powerbi-connector-app-security-group:** You need to add the created security group into PowerBI portal to grant resource access. Follow below steps to assign privileges to your security group.

a. Login to https://app.powerbi.com/

b. Go to `Settings` -> `Admin Portal`

c. On `Admin Portal` navigate to `Tenant settings` as shown in below screenshot.

<p align="center">
<img width="75%" alt="powerbi_admin_portal" src="https://raw.githubusercontent.com/main/static-assets/main/imgs/guides/powerbi/powerbi-admin-portal.png"/>
<img width="75%" alt="powerbi_admin_portal" src="https://raw.githubusercontent.com/datahub-project/static-assets/main/imgs/guides/powerbi/powerbi-admin-portal.png"/>
</p>

d. **Enable PowerBI API:** Under `Tenant settings` -> `Developer settings` -> `Allow service principals to use Power BI APIs` add the previously created security group i.e. *powerbi-connector-app-security-group* into `Specific security groups (Recommended)`
d. **Enable PowerBI API:** Under `Tenant settings` -> `Developer settings` -> `Allow service principals to use Power BI APIs` add the previously created security group i.e. _powerbi-connector-app-security-group_ into `Specific security groups (Recommended)`

e. **Enable Admin API Settings:** Under `Tenant settings` -> `Admin API settings` enable the following options
e. **Enable Admin API Settings:** Under `Tenant settings` -> `Admin API settings` enable the following options

- `Allow service principals to use read-only admin APIs`
- `Enhance admin APIs responses with detailed metadata`
- `Enhance admin APIs responses with DAX and mashup expressions`

* `Allow service principals to use read-only admin APIs`
* `Enhance admin APIs responses with detailed metadata`
* `Enhance admin APIs responses with DAX and mashup expressions`


f. **Add Security Group to Workspace:** Navigate to `Workspaces` window and open workspace which you want to ingest as shown in below screenshot and click on `Access` and add `powerbi-connector-app-security-group` as member

<p align="center">
<img width="75%" alt="powerbi_admin_portal" src="https://raw.githubusercontent.com/main/static-assets/main/imgs/guides/powerbi/workspace-window.png"/>
<img width="75%" alt="workspace-window-underlined" src="https://raw.githubusercontent.com/datahub-project/static-assets/main/imgs/guides/powerbi/workspace-window-undrlined.png"/>
</p>


## Next Steps

Once you've done all of the above steps, it's time to [move on](configuration.md) to configuring the actual ingestion source within DataHub.

*Need more help? Join the conversation in [Slack](https://slack.datahubproject.io)!*
_Need more help? Join the conversation in [Slack](https://slack.datahubproject.io)!_

0 comments on commit 35dde47

Please sign in to comment.