Question:
What are the steps to configure Service Principal as Microsoft Power BI System Credentials?
Answer:
Please follow the below steps to configure Service Principal for Power BI.
1.
Create a new Application in Azure and configure
Azure App Permissions. In my case here, I called it DH-Test-PBI. Below is a screenshot of the App and the minimal API permissions list.
2. Create a Security Group in Azure Portal
-> Microsoft Entra ID -> Manage -> Groups. Add the newly created Azure app as a
member within this Security Group. The name of my Security group is DH-QA_PBI_SP_Group.
You can see my App: DH-Test-PBI added to the Security group: DH-QA_PBI_SP_Group as a Member.
3. Go to PowerBI's Admin Portal -> Tenant
Settings. Find Developer settings -> Service principals can
use Fabric APIs. Enable it for Specific security groups. And add the
security group created in step 2 into it.
Now in the same area, Find Admin API settings -> Service principals
can access read-only admin APIs. Enable it for Specific security groups.
And add the security group created in step 2 into it.
4. Go to Admin portal -> Workspaces
and add the Service Principal which is the Azure app as a Viewer of all the
workspaces that's needed for indexing in DigitalHive. Put a check mark next to your Workspace and click the 3 dots in the center and select: Access to do this.
5. Now go to Digital Hive and setup the Connector. The App ID and Tenant ID can be copied from the below screenshot. You will also need to create a Secret ID by clicking on Client credentials on the left hand side.
Under Advanced settings, make sure you check the box Use Service Principal as System Credential in Digital Hive.
6. Finally test the Authentication in Digital Hive to make sure it works as expected.