# Microsoft Power BI

## Before you start

To connect Microsoft Power BI to Select Star, you will need...

* Admin access to Microsoft Entra ID (formerly Azure AD)
* Admin access to Microsoft Fabric (formerly Power BI Admin Portal)

Complete the following steps to enable metadata, lineage, and popularity of your Microsoft Power BI in Select Star.

1. [Create an Azure app](#id-1.-create-an-azure-app)
2. [Create a security group in Microsoft Entra ID](#id-2.-create-a-security-group-in-microsoft-entra-id)
3. [Enable the Power BI service admin settings](#id-3.-enable-the-power-bi-service-admin-settings)
4. [Add Azure app to your workspace](#id-4.-add-azure-app-to-your-workspace)
5. [Connect Power BI API to Select Star](#id-5.-connect-power-bi-api-to-select-star)

## 1. Create an Azure app

1\. Open the [Azure Portal](https://ms.portal.azure.com/#allservices) and sign in.

2\. Search for **App registrations**, and select it.

3\. Click **New registration**.

4\. Fill in the required information:

* Name: type "Select Star"
* Supported account types: leave the default value
  * "Accounts in this organizational directory only (xxxxxxxxx only - Single tenant)"
* Redirect URI - leave empty

5\. Click **Register**.

![Screenshot shows the filled registration form.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-70eee57dbff63a722017f7ee820954ad038d1fe7%2FScreenshot%202025-08-06%20at%2013.29.08.png?alt=media)

6. From the Overview page, copy the **Application (client) ID** and **Directory (tenant) ID**, and securely store them for next steps.

![Screenshot shows where to obtain the Client ID, and Tenant ID](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-09f24203282815d6a489c3243a2d8a75e34becef%2FScreenshot%202025-08-06%20at%2013.34.43.png?alt=media)

7\. Click the **Certificates & secrets** from the left menu.

8\. Under Client secrets, click **+ New client secret**.

![Screenshot shows the new client secret button in the Certificates and secrets tab.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-f97f2a5dbdb2149c0c68600f37afa532a8b5ee75%2FScreenshot%202025-08-06%20at%2013.41.32.png?alt=media)

In the Add a client secret window, enter a description, select an expiry time, and click **Add**.

* *Sample description: Secret used to connect Select Star to Microsoft Power BI*

Copy the client secret **Value** and securely store it for the next steps.

![Screenshot shows where to obtain the Client secret value in the Certificates and secrets tab](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-94187652e18a133435805e2fd62c3a1969a93ec0%2FScreenshot%202025-08-06%20at%2013.48.52.png?alt=media)

## 2. Create a security group in Microsoft Entra ID

1\. Open the [Azure Portal](https://ms.portal.azure.com/#allservices) and sign in.

2\. Search for **Microsoft Entra ID**, and select it.

3\. Click the **Groups**, under Manage section.

![Screenshot shows the Groups tab for an app in the Azure Active Directory section.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-c6361eb08190f039d77d49c24f6fb1c048410544%2FScreenshot%202025-08-06%20at%2019.45.53.png?alt=media)

4\. Click **New group**.

5\. Fill in the required information:

* Group type - select "Security"
* Name - type "Power BI - API Access"
* Group description - enter any description or leave empty
  * *Sample description: Security group to grant API access*

6\. Click "No members selected" to open a drawer. Search for **Select Star** user and select it. Click the **Select** button to confirm.

7\. Click **Create**.

![Screenshot shows the filled in form, and selected memeber for security group.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-04e81c9fd8291beded9fd60c72a5d9bbd53d06a3%2FScreenshot%202025-08-06%20at%2019.52.40.png?alt=media)

By the end of these steps, you have registered an application with Microsoft Entra ID and created a Security Group with the appropriate member.

## 3. Enable the Power BI service admin settings

1\. Open [Power BI admin portal](https://app.powerbi.com/admin-portal/) and sign in.

2\. Click **Tenant Settings** under the Admin Portal.

* You must have admin access to Microsoft Fabric to configure these settings

3\. Under **Developer settings**:

* Expand **Service principals can call Fabric public APIs**
  * Set this to Enabled.
  * Add your security group you created in [Step 2](#id-2.-create-a-security-group-in-microsoft-entra-id), under **Specific security groups.**
  * Click **Apply**.

4\. Repeat the process for the subsections under the **Admin API settings** section.

* Open the section, Set **Enabled,** and add the security group you created in [Step 2](#id-2.-create-a-security-group-in-microsoft-entra-id). Click **Apply**.

You must complete the steps for the following sections under **Admin API settings**:

* Service principals can access read-only admin APIs
* Enhance admin APIs responses with detailed metadata
* Enhance admin APIs responses with DAX and mashup expressions

<figure><img src="https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-aea65ce8bae193fe1f431143f5f8263d14518a41%2FScreenshot%202025-08-06%20at%2020.07.34.png?alt=media" alt=""><figcaption><p>The screenshot shows the highleted sections, needed to enabled for Microsoft Power BI Integration</p></figcaption></figure>

## 4. Add Azure app to your workspace

1\. Open [Power BI](https://app.powerbi.com/) and sign in.

2\. Search for the workspace you want to enable access for, and from the three-button menu, select **Workspace access**.

![Screenshot shows the "Workspace access" button in workspace list.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-fe17fd8925d1e35b26327ea72ff6eced94ae72b5%2FScreenshot%202025-08-06%20at%2020.14.15%20\(1\).png?alt=media)

3\. Click **+ Add people or groups**

4\. Search for the app you created in [step 1](#id-1.-create-an-azure-app), i.e, **Select Star**, and select it. Set the permissions to **Contributor**.

5\. Click **Add**, and close the drawer.

6\. Repeat the above steps for all workspaces you want to be added to Select Star.

{% hint style="warning" %}
**Important!** If you have any Power BI reports using Semantic Models from other workspaces, please make sure to add the Azure App you created in [**Step 1**](#id-1.-create-an-azure-app) as a **Contributor** to all those workspaces.\
This is required to ingest the reports' metadata and generate the column-level lineage.
{% endhint %}

## 5. Connect Power BI API to Select Star

1\. Go to the Select Star **Settings**. Click **Data** in the sidebar, then **+ Add** to create a new Data Source.

![Screenshot shows the "Add Data source" tab for PowerBI in Select Star.](https://3470314135-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MgAiVthA_yg9UXKuhyY%2Fuploads%2Fgit-blob-90312b09e9a478db1256db0c1946e0e50684a80a%2FpowerBI-add-data-source.png?alt=media\&token=6afecb74-d351-45eb-9bf3-5f2c4cecaea2)

2\. Fill in the required information:

* **Client ID:** Application (client) ID of Azure App from [step 1.6](#id-1.-create-an-azure-app) above.
* **Client Secret:** Client secret value of Azure App from [step 1.8](#id-1.-create-an-azure-app) above.
* **Tenant ID:** Directory (tenant) ID of Azure App from [step 1.6](#id-1.-create-an-azure-app) above.
